<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Responder on MrAzoth</title>
    <link>https://az0th.it/tags/responder/</link>
    <description>Recent content in Responder on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <atom:link href="https://az0th.it/tags/responder/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Credential Attacks &amp; Relay — From Kali</title>
      <link>https://az0th.it/ad/kali/credential-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/credential-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Prerequisite&lt;/th&gt;
          &lt;th&gt;Output&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;LLMNR/NBT-NS Poisoning&lt;/td&gt;
          &lt;td&gt;Responder&lt;/td&gt;
          &lt;td&gt;Network access, no SMB signing required&lt;/td&gt;
          &lt;td&gt;NTLMv1/v2 hashes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SMB Relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx.py&lt;/td&gt;
          &lt;td&gt;SMB signing disabled on target&lt;/td&gt;
          &lt;td&gt;SAM dump / shell&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LDAP Relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx.py&lt;/td&gt;
          &lt;td&gt;LDAP on DC accessible&lt;/td&gt;
          &lt;td&gt;Computer accounts / RBCD&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;IPv6 Poisoning&lt;/td&gt;
          &lt;td&gt;mitm6 + ntlmrelayx&lt;/td&gt;
          &lt;td&gt;IPv6 not disabled on network&lt;/td&gt;
          &lt;td&gt;LDAP relay → DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Coercion + Relay&lt;/td&gt;
          &lt;td&gt;PetitPotam / printerbug&lt;/td&gt;
          &lt;td&gt;Auth path to coerced machine&lt;/td&gt;
          &lt;td&gt;NTLM relay or TGT&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DCSync&lt;/td&gt;
          &lt;td&gt;secretsdump.py&lt;/td&gt;
          &lt;td&gt;Domain Admin or replication rights&lt;/td&gt;
          &lt;td&gt;All NTLM hashes + AES keys&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS Dump&lt;/td&gt;
          &lt;td&gt;lsassy&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
          &lt;td&gt;Plaintext / hashes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;GPP Passwords&lt;/td&gt;
          &lt;td&gt;nxc -M gpp_password&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
          &lt;td&gt;Cleartext credential&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Password Spraying&lt;/td&gt;
          &lt;td&gt;nxc smb/ldap&lt;/td&gt;
          &lt;td&gt;Valid username list&lt;/td&gt;
          &lt;td&gt;Valid credentials&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;llmnrnbt-ns-poisoning-with-responder&#34;&gt;LLMNR/NBT-NS Poisoning with Responder&lt;/h2&gt;
&lt;p&gt;LLMNR (Link-Local Multicast Name Resolution) and NBT-NS (NetBIOS Name Service) are fallback name resolution protocols used by Windows when DNS fails. When a host cannot resolve a name, it broadcasts an LLMNR/NBT-NS query to the local subnet. Responder answers these queries with the attacker&amp;rsquo;s IP, forcing the victim to authenticate — capturing NTLMv1 or NTLMv2 hashes.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
