Step 1. Starting Responder¶
To begin, ensure that Responder is installed on your system. If it’s not already installed, follow these steps:
-
Update the package list:
-
Install Responder:
-
Run Responder with default settings, Replace
ens224
with the name of your network interface:
Step 2. Responder Operational Overview¶
Responder actively listens for LLMNR, NBT-NS, and MDNS requests on the network and responds to them. When it captures a hash, it saves it in the /usr/share/responder/logs
directory. You can monitor activity either directly in the terminal or by reviewing the log files.
- Terminal Output: Responder displays captured hashes and relevant information in real time.
- Log Files: Captured hashes are stored in
/usr/share/responder/logs
. - Captured Data: Typically, Responder captures NTLMv2 hashes, logging them with real-time updates.
Step 3. Cracking NTLMv2 Hashes¶
Once you have captured hashes, you can crack them using Hashcat or John the Ripper.
The examples below use the rockyou.txt
wordlist.
-
Crack NTLMv2 hashes with Hashcat:
-
Crack NTLMv2 hashes with John the Ripper: