βοΈ3 - Poisoning & Relay - IPv4

The main idea about that, is leave running in the background responder, while we do other techniques, after a while, meave will have hashes to crack
Responder

This are a NETNTML hashes, its cant use to path the hash butttttt... we can crack the password
Cracking Hahes

[ i ] Responder keep the logs in /opt/tools/Responder/logs (on exegol), if you need to show them again.
NTLM Relay

Relaying SMB using Responder & Ntlmrelayx


With this we have a list of
signing:Falsesmb computers, we can start to try the relay
Knowing this, frist we need set OFF into /usr/share/responder/Responder.conf the SMB and HTTP -->

With the above list generated by --gen-relay-list (up command), we have a targets. The ejecute the ntlmrelayx -->
First we poison the network and then we launch a responder
A few a time, we can see that both the responder and ntlmrelayx they found socks -->


With it, we can use the command socks into ntlmrealyx ... WAIT
Last updated