mirror of
https://github.com/lgandx/Responder.git
synced 2025-08-21 05:43:35 -07:00
Merge branch 'master' of https://github.com/lgandx/Responder
This commit is contained in:
commit
79dfe8ebd0
6 changed files with 35 additions and 23 deletions
32
README.md
32
README.md
|
@ -10,21 +10,21 @@ Author: Laurent Gaffie <laurent.gaffie@gmail.com > https://g-laurent.blogspot.c
|
||||||
|
|
||||||
Responder is an LLMNR, NBT-NS and MDNS poisoner. It will answer to *specific* NBT-NS (NetBIOS Name Service) queries based on their name suffix (see: http://support.microsoft.com/kb/163409). By default, the tool will only answer to File Server Service request, which is for SMB.
|
Responder is an LLMNR, NBT-NS and MDNS poisoner. It will answer to *specific* NBT-NS (NetBIOS Name Service) queries based on their name suffix (see: http://support.microsoft.com/kb/163409). By default, the tool will only answer to File Server Service request, which is for SMB.
|
||||||
|
|
||||||
The concept behind this is to target our answers, and be stealthier on the network. This also helps to ensure that we don't break legitimate NBT-NS behavior. You can set the -r option via command line if you want to answer to the Workstation Service request name suffix.
|
The concept behind this is to target our answers, and be stealthier on the network. This also helps to ensure that we don't break legitimate NBT-NS behavior. You can set the -r option via command line if you want to answer to the Workstation Service request name suffix. The option -d is also available if you want to poison Domain Service name queries.
|
||||||
|
|
||||||
## Features ##
|
## Features ##
|
||||||
|
|
||||||
- Built-in SMB Auth server.
|
- Built-in SMB Auth server.
|
||||||
|
|
||||||
Supports NTLMv1, NTLMv2 hashes with Extended Security NTLMSSP by default. Successfully tested from Windows 95 to Server 2012 RC, Samba and Mac OSX Lion. Clear text password is supported for NT4, and LM hashing downgrade when the --lm option is set. SMBv2 has also been implemented and is supported by default.
|
Supports NTLMv1, NTLMv2 hashes with Extended Security NTLMSSP by default. Successfully tested from Windows 95 to Server 2022, Samba and Mac OSX Lion. Clear text password is supported for NT4, and LM hashing downgrade when the --lm option is set. SMBv2 has also been implemented and is supported by default.
|
||||||
|
|
||||||
- Built-in MSSQL Auth server.
|
- Built-in MSSQL Auth server.
|
||||||
|
|
||||||
In order to redirect SQL Authentication to this tool, you will need to set the option -r (NBT-NS queries for SQL Server lookup are using the Workstation Service name suffix) for systems older than windows Vista (LLMNR will be used for Vista and higher). This server supports NTLMv1, LMv2 hashes. This functionality was successfully tested on Windows SQL Server 2005 & 2008.
|
In order to redirect SQL Authentication to this tool, you will need to set the option -r (NBT-NS queries for SQL Server lookup are using the Workstation Service name suffix) for systems older than windows Vista (LLMNR will be used for Vista and higher). This server supports NTLMv1, LMv2 hashes. This functionality was successfully tested on Windows SQL Server 2005, 2008, 2012, 2019.
|
||||||
|
|
||||||
- Built-in HTTP Auth server.
|
- Built-in HTTP Auth server.
|
||||||
|
|
||||||
In order to redirect HTTP Authentication to this tool, you will need to set the option -r for Windows version older than Vista (NBT-NS queries for HTTP server lookup are sent using the Workstation Service name suffix). For Vista and higher, LLMNR will be used. This server supports NTLMv1, NTLMv2 hashes *and* Basic Authentication. This server was successfully tested on IE 6 to IE 10, Firefox, Chrome, Safari.
|
In order to redirect HTTP Authentication to this tool, you will need to set the option -r for Windows version older than Vista (NBT-NS queries for HTTP server lookup are sent using the Workstation Service name suffix). For Vista and higher, LLMNR will be used. This server supports NTLMv1, NTLMv2 hashes *and* Basic Authentication. This server was successfully tested on IE 6 to IE 11, Edge, Firefox, Chrome, Safari.
|
||||||
|
|
||||||
Note: This module also works for WebDav NTLM authentication issued from Windows WebDav clients (WebClient). You can now send your custom files to a victim.
|
Note: This module also works for WebDav NTLM authentication issued from Windows WebDav clients (WebClient). You can now send your custom files to a victim.
|
||||||
|
|
||||||
|
@ -34,7 +34,11 @@ Same as above. The folder certs/ contains 2 default keys, including a dummy pri
|
||||||
|
|
||||||
- Built-in LDAP Auth server.
|
- Built-in LDAP Auth server.
|
||||||
|
|
||||||
In order to redirect LDAP Authentication to this tool, you will need to set the option -r for Windows version older than Vista (NBT-NS queries for HTTP server lookup are sent using the Workstation Service name suffix). For Vista and higher, LLMNR will be used. This server supports NTLMSSP hashes and Simple Authentication (clear text authentication). This server was successfully tested on Windows Support tool "ldp" and LdapAdmin.
|
In order to redirect LDAP Authentication to this tool, you will need to set the option -r for Windows version older than Vista (NBT-NS queries for LDAP server lookup are sent using the Workstation Service name suffix). For Vista and higher, LLMNR will be used. This server supports NTLMSSP hashes and Simple Authentication (clear text authentication). This server was successfully tested on Windows Support tool "ldp" and LdapAdmin.
|
||||||
|
|
||||||
|
- Built-in DCE-RPC Auth server.
|
||||||
|
|
||||||
|
In order to redirect DCE-RPC Authentication to this tool, you will need to set the option -r and -d (NBT-NS queries for DCE-RPC server lookup are sent using the Workstation and Domain Service name suffix). For Vista and higher, LLMNR will be used. This server supports NTLMSSP hashes. This server was successfully tested on Windows XP to Server 2019.
|
||||||
|
|
||||||
- Built-in FTP, POP3, IMAP, SMTP Auth servers.
|
- Built-in FTP, POP3, IMAP, SMTP Auth servers.
|
||||||
|
|
||||||
|
@ -42,7 +46,7 @@ This modules will collect clear text credentials.
|
||||||
|
|
||||||
- Built-in DNS server.
|
- Built-in DNS server.
|
||||||
|
|
||||||
This server will answer type A queries. This is really handy when it's combined with ARP spoofing.
|
This server will answer type SRV and A queries. This is really handy when it's combined with ARP spoofing.
|
||||||
|
|
||||||
- Built-in WPAD Proxy Server.
|
- Built-in WPAD Proxy Server.
|
||||||
|
|
||||||
|
@ -66,7 +70,7 @@ For MITM on Windows XP/2003 and earlier Domain members. This attack combined wit
|
||||||
|
|
||||||
python tools/DHCP.py
|
python tools/DHCP.py
|
||||||
|
|
||||||
DHCP Inform Spoofing. Allows you to let the real DHCP Server issue IP addresses, and then send a DHCP Inform answer to set your IP address as a primary DNS server, and your own WPAD URL.
|
DHCP Inform Spoofing. Allows you to let the real DHCP Server issue IP addresses, and then send a DHCP Inform answer to set your IP address as a primary DNS server, and your own WPAD URL. To inject a DNS server, domain, route on all Windows version and any linux box, use -R
|
||||||
|
|
||||||
- Analyze mode.
|
- Analyze mode.
|
||||||
|
|
||||||
|
@ -89,7 +93,7 @@ Additionally, all captured hashed are logged into an SQLite database which you c
|
||||||
|
|
||||||
## Considerations ##
|
## Considerations ##
|
||||||
|
|
||||||
- This tool listens on several ports: UDP 137, UDP 138, UDP 53, UDP/TCP 389,TCP 1433, UDP 1434, TCP 80, TCP 139, TCP 445, TCP 21, TCP 3141,TCP 25, TCP 110, TCP 587, TCP 3128, Multicast UDP 5355 and 5353.
|
- This tool listens on several ports: UDP 137, UDP 138, UDP 53, UDP/TCP 389,TCP 1433, UDP 1434, TCP 80, TCP 135, TCP 139, TCP 445, TCP 21, TCP 3141,TCP 25, TCP 110, TCP 587, TCP 3128, Multicast UDP 5355 and 5353.
|
||||||
|
|
||||||
- If you run Samba on your system, stop smbd and nmbd and all other services listening on these ports.
|
- If you run Samba on your system, stop smbd and nmbd and all other services listening on these ports.
|
||||||
|
|
||||||
|
@ -176,9 +180,11 @@ Or BTC address:
|
||||||
|
|
||||||
Late Responder development has been possible because of the donations received from individuals and companies.
|
Late Responder development has been possible because of the donations received from individuals and companies.
|
||||||
|
|
||||||
We would like to thanks those major donator:
|
We would like to thanks those major sponsors:
|
||||||
|
|
||||||
- SecureWorks : https://www.secureworks.com/
|
- SecureWorks: https://www.secureworks.com/
|
||||||
|
|
||||||
|
- Synacktiv: https://www.synacktiv.com/
|
||||||
|
|
||||||
- Black Hills Information Security: http://www.blackhillsinfosec.com/
|
- Black Hills Information Security: http://www.blackhillsinfosec.com/
|
||||||
|
|
||||||
|
@ -192,6 +198,12 @@ We would like to thanks those major donator:
|
||||||
|
|
||||||
Thank you.
|
Thank you.
|
||||||
|
|
||||||
|
## Official Discord Channel
|
||||||
|
|
||||||
|
Come hang out on Discord!
|
||||||
|
|
||||||
|
[](https://discord.gg/sEkn3aa)
|
||||||
|
|
||||||
## Copyright ##
|
## Copyright ##
|
||||||
|
|
||||||
NBT-NS/LLMNR Responder
|
NBT-NS/LLMNR Responder
|
||||||
|
|
|
@ -29,7 +29,7 @@ import time
|
||||||
import random
|
import random
|
||||||
import subprocess
|
import subprocess
|
||||||
from threading import Thread
|
from threading import Thread
|
||||||
if PY2OR3 is "PY3":
|
if PY2OR3 == "PY3":
|
||||||
from socketserver import TCPServer, UDPServer, ThreadingMixIn, BaseRequestHandler
|
from socketserver import TCPServer, UDPServer, ThreadingMixIn, BaseRequestHandler
|
||||||
else:
|
else:
|
||||||
from SocketServer import TCPServer, UDPServer, ThreadingMixIn, BaseRequestHandler
|
from SocketServer import TCPServer, UDPServer, ThreadingMixIn, BaseRequestHandler
|
||||||
|
@ -159,13 +159,13 @@ Logs = logging
|
||||||
Logs.basicConfig(filemode="w",filename=Logs_Path+'logs/SMBRelay-Session.txt',level=logging.INFO, format='%(asctime)s - %(message)s', datefmt='%m/%d/%Y %I:%M:%S %p')
|
Logs.basicConfig(filemode="w",filename=Logs_Path+'logs/SMBRelay-Session.txt',level=logging.INFO, format='%(asctime)s - %(message)s', datefmt='%m/%d/%Y %I:%M:%S %p')
|
||||||
|
|
||||||
def NetworkSendBufferPython2or3(data):
|
def NetworkSendBufferPython2or3(data):
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return str(data)
|
return str(data)
|
||||||
else:
|
else:
|
||||||
return bytes(str(data), 'latin-1')
|
return bytes(str(data), 'latin-1')
|
||||||
|
|
||||||
def NetworkRecvBufferPython2or3(data):
|
def NetworkRecvBufferPython2or3(data):
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return str(data)
|
return str(data)
|
||||||
else:
|
else:
|
||||||
return str(data.decode('latin-1'))
|
return str(data.decode('latin-1'))
|
||||||
|
@ -446,12 +446,12 @@ class SMBRelay(BaseRequestHandler):
|
||||||
data = self.request.recv(4096)
|
data = self.request.recv(4096)
|
||||||
|
|
||||||
## Make sure it's not a Kerberos auth.
|
## Make sure it's not a Kerberos auth.
|
||||||
if data.find(b'NTLM') is not -1:
|
if data.find(b'NTLM') != -1:
|
||||||
## Start with nego protocol + session setup negotiate to our target.
|
## Start with nego protocol + session setup negotiate to our target.
|
||||||
data, smbdata, s, challenge = GrabNegotiateFromTarget(data, s, Pivoting)
|
data, smbdata, s, challenge = GrabNegotiateFromTarget(data, s, Pivoting)
|
||||||
|
|
||||||
## Make sure it's not a Kerberos auth.
|
## Make sure it's not a Kerberos auth.
|
||||||
if data.find(b'NTLM') is not -1:
|
if data.find(b'NTLM') != -1:
|
||||||
##Relay all that to our client.
|
##Relay all that to our client.
|
||||||
if data[8:10] == b'\x73\x00':
|
if data[8:10] == b'\x73\x00':
|
||||||
head = SMBHeader(cmd="\x73",flag1="\x98", flag2="\x43\xc8", errorcode="\x16\x00\x00\xc0", pid=pidcalc(data),mid=midcalc(data))
|
head = SMBHeader(cmd="\x73",flag1="\x98", flag2="\x43\xc8", errorcode="\x16\x00\x00\xc0", pid=pidcalc(data),mid=midcalc(data))
|
||||||
|
|
|
@ -66,20 +66,20 @@ class Packet():
|
||||||
|
|
||||||
def StructWithLenPython2or3(endian,data):
|
def StructWithLenPython2or3(endian,data):
|
||||||
#Python2...
|
#Python2...
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return struct.pack(endian, data)
|
return struct.pack(endian, data)
|
||||||
#Python3...
|
#Python3...
|
||||||
else:
|
else:
|
||||||
return struct.pack(endian, data).decode('latin-1')
|
return struct.pack(endian, data).decode('latin-1')
|
||||||
|
|
||||||
def NetworkSendBufferPython2or3(data):
|
def NetworkSendBufferPython2or3(data):
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return str(data)
|
return str(data)
|
||||||
else:
|
else:
|
||||||
return bytes(str(data), 'latin-1')
|
return bytes(str(data), 'latin-1')
|
||||||
|
|
||||||
def NetworkRecvBufferPython2or3(data):
|
def NetworkRecvBufferPython2or3(data):
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return str(data)
|
return str(data)
|
||||||
else:
|
else:
|
||||||
return str(data.decode('latin-1'))
|
return str(data.decode('latin-1'))
|
||||||
|
|
|
@ -45,7 +45,7 @@ else:
|
||||||
|
|
||||||
def StructWithLenPython2or3(endian,data):
|
def StructWithLenPython2or3(endian,data):
|
||||||
#Python2...
|
#Python2...
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return struct.pack(endian, data)
|
return struct.pack(endian, data)
|
||||||
#Python3...
|
#Python3...
|
||||||
else:
|
else:
|
||||||
|
|
|
@ -11,7 +11,7 @@ else:
|
||||||
|
|
||||||
def StructWithLenPython2or3(endian,data):
|
def StructWithLenPython2or3(endian,data):
|
||||||
#Python2...
|
#Python2...
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return struct.pack(endian, data)
|
return struct.pack(endian, data)
|
||||||
#Python3...
|
#Python3...
|
||||||
else:
|
else:
|
||||||
|
|
|
@ -47,20 +47,20 @@ SMB1 = "Enabled"
|
||||||
|
|
||||||
def StructWithLenPython2or3(endian,data):
|
def StructWithLenPython2or3(endian,data):
|
||||||
#Python2...
|
#Python2...
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return struct.pack(endian, data)
|
return struct.pack(endian, data)
|
||||||
#Python3...
|
#Python3...
|
||||||
else:
|
else:
|
||||||
return struct.pack(endian, data).decode('latin-1')
|
return struct.pack(endian, data).decode('latin-1')
|
||||||
|
|
||||||
def NetworkSendBufferPython2or3(data):
|
def NetworkSendBufferPython2or3(data):
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return str(data)
|
return str(data)
|
||||||
else:
|
else:
|
||||||
return bytes(str(data), 'latin-1')
|
return bytes(str(data), 'latin-1')
|
||||||
|
|
||||||
def NetworkRecvBufferPython2or3(data):
|
def NetworkRecvBufferPython2or3(data):
|
||||||
if PY2OR3 is "PY2":
|
if PY2OR3 == "PY2":
|
||||||
return str(data)
|
return str(data)
|
||||||
else:
|
else:
|
||||||
return str(data.decode('latin-1'))
|
return str(data.decode('latin-1'))
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue