mirror of
https://github.com/lgandx/Responder.git
synced 2025-08-21 22:03:30 -07:00
Updated DHCP Server (markdown)
parent
27b589139c
commit
e699f5892d
1 changed files with 3 additions and 1 deletions
|
@ -56,6 +56,8 @@ The best way to inject a WPAD url on a victim's workstation is to use DHCP.py wi
|
||||||
|
|
||||||
When you provide a WPAD url, best is to provide your IP address and not a random NetBIOS name, since you don't know if LLMNR/NetBIOS is enabled on that workstation. **Also make sure to change "WPADScript" setting in Responder.conf and replace "ProxySrv" with your IP address.**
|
When you provide a WPAD url, best is to provide your IP address and not a random NetBIOS name, since you don't know if LLMNR/NetBIOS is enabled on that workstation. **Also make sure to change "WPADScript" setting in Responder.conf and replace "ProxySrv" with your IP address.**
|
||||||
|
|
||||||
The best Responder setting when you launch this attack is: ./Responder.py -I eth0 -rPv
|
The best Responder setting when you launch this attack is:
|
||||||
|
|
||||||
|
>./Responder.py -I eth0 -r**P**v
|
||||||
|
|
||||||
This attack is highly effective and gives you assured NTLMv1/2 hashes.
|
This attack is highly effective and gives you assured NTLMv1/2 hashes.
|
Loading…
Add table
Add a link
Reference in a new issue