Updated DHCP Server (markdown)

lgandx 2021-04-21 12:35:44 -03:00
commit e699f5892d

@ -56,6 +56,8 @@ The best way to inject a WPAD url on a victim's workstation is to use DHCP.py wi
When you provide a WPAD url, best is to provide your IP address and not a random NetBIOS name, since you don't know if LLMNR/NetBIOS is enabled on that workstation. **Also make sure to change "WPADScript" setting in Responder.conf and replace "ProxySrv" with your IP address.** When you provide a WPAD url, best is to provide your IP address and not a random NetBIOS name, since you don't know if LLMNR/NetBIOS is enabled on that workstation. **Also make sure to change "WPADScript" setting in Responder.conf and replace "ProxySrv" with your IP address.**
The best Responder setting when you launch this attack is: ./Responder.py -I eth0 -rPv The best Responder setting when you launch this attack is:
>./Responder.py -I eth0 -r**P**v
This attack is highly effective and gives you assured NTLMv1/2 hashes. This attack is highly effective and gives you assured NTLMv1/2 hashes.