Home » Tools » 21. Red Team Tools » 3. Responder

3. Responder

Description:
Responder is used for poisoning LLMNR, NBT-NS, and MDNS requests, capturing hashed credentials, and providing the attacker with an opportunity to relay or crack the credentials. It is highly effective in environments where LLMNR and NBT-NS are enabled, often found in Windows environments.

Examples:

    1. Start Responder:
      • responder -I eth0

Explanation: Starts Responder on the eth0 interface, allowing it to intercept and poison network requests to capture credentials.

Scroll to Top