mirror of
https://github.com/lgandx/Responder.git
synced 2025-08-14 02:27:12 -07:00
Updated to reflect recent changes.
This commit is contained in:
parent
63daac7840
commit
e8000fb260
2 changed files with 4 additions and 4 deletions
|
@ -1,4 +1,6 @@
|
|||
ChangeLog Responder 2.0:
|
||||
- Added: Ability to inject custom HTML in HTTP responses.
|
||||
- Added: New WPAD proxy server. Enabled by default.
|
||||
- Several improvements.
|
||||
- Added: SMTP module
|
||||
- Added: POP3 module
|
||||
|
|
|
@ -84,9 +84,7 @@ FEATURES
|
|||
- Icmp Redirect for MITM on Windows XP/2003 and earlier Domain members. This attack combined with
|
||||
the DNS module is pretty effective.
|
||||
|
||||
- WPAD rogue transparent proxy server. This module will *silently* grab the encrypted
|
||||
credentials of anyone launching Internet Explorer on the network. It will also grab
|
||||
the cookie of the requested page. This module is higly effective. You can now send your custom Pac script to a victim. See Responder.conf.
|
||||
- WPAD rogue transparent proxy server. This module will capture all HTTP requests from anyone launching Internet Explorer on the network. This module is higly effective. You can now send your custom Pac script to a victim and inject HTML into the server's responses. See Responder.conf. This module is now enabled by default.
|
||||
|
||||
- Responder is now using a configuration file. See Responder.conf.
|
||||
|
||||
|
@ -146,7 +144,7 @@ Options List:
|
|||
-f Off, --fingerprint=Off This option allows you to fingerprint a
|
||||
host that issued an NBT-NS or LLMNR query.
|
||||
|
||||
-w On, --wpad=On Set this to On or Off to start/stop the WPAD rogue
|
||||
-w On, --wpad=On Set this to On or Off to start/stop the WPAD rogue
|
||||
proxy server. Default value is On
|
||||
|
||||
--lm=Off Set this to On if you want to force LM hashing
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue