βš”οΈ3 - Poisoning & Relay - IPv4

The main idea about that, is leave running in the background responder, while we do other techniques, after a while, meave will have hashes to crack

Responder

This are a NETNTML hashes, its cant use to path the hash butttttt... we can crack the password

Cracking Hahes

[ i ] Responder keep the logs in /opt/tools/Responder/logs (on exegol), if you need to show them again.

NTLM Relay

Relaying SMB using Responder & Ntlmrelayx

With this we have a list of signing:False smb computers, we can start to try the relay

Knowing this, frist we need set OFF into /usr/share/responder/Responder.conf the SMB and HTTP -->

With the above list generated by --gen-relay-list (up command), we have a targets. The ejecute the ntlmrelayx -->

First we poison the network and then we launch a responder

A few a time, we can see that both the responder and ntlmrelayx they found socks -->

responder

With it, we can use the command socks into ntlmrealyx ... WAIT

Last updated