Pentest List Wiki
  • What is Pentest List Wiki?
  • OFFENSIVE SECURITY
    • External Infrastructure
      • Discovery
        • Email Address Discovery
        • Subdomain Discovery
        • Data Discovery
        • Port & Service Discovery
      • Exploitation
        • Password Spraying
        • Vulnerability Scanning
    • Internal Infrastructure
      • General Discovery
        • AD Attack Path Discovery
        • Port & Service Discovery
      • Credential Discovery
        • Passwords and NetNTLM
        • SAM & LSA secrets
        • NTDS.dit secrets
        • LSASS secrets
        • DCSync
        • DPAPI secrets
      • Movement
        • Credential Spraying
        • SMB Relaying
        • Pass The Hash
      • Infiltration/Exfiltration
        • Pivoting (Proxying)
    • Web Application
      • Discovery
        • Testing API Keys
        • Vulnerability Scan
        • Web Content Discovery
        • Parameter Discovery
        • VHOST Discovery
        • CMS Scanners
      • Exploitation
        • Authentication
          • Email Address Forms
          • AWS Cognito
        • JSON Web Tokens
        • Injection Attacks
          • SQL Injection
          • Cross-Site Scripting
          • HTTP Headers
      • Bypasses
        • Cloudflare Bypass
        • HTTP 403 Bypass
    • Mobile (iOS/Android)
      • iOS
        • IPA Decryption
        • Filesystem Analysis
        • Static Analysis
    • Cloud
      • AWS
        • Vulnerability Scanners
        • S3 Buckets
      • Azure
        • Vulnerability Scanners
        • m365 & Entra ID
  • DEFENSIVE SECURITY
    • Forged Kerberos Tickets
    • Logon Event Visualisation
Powered by GitBook
On this page
  1. OFFENSIVE SECURITY
  2. Internal Infrastructure
  3. Credential Discovery

Passwords and NetNTLM

How to find cleartext passwords and NetNTLM hashes.

PreviousCredential DiscoveryNextSAM & LSA secrets

Last updated 11 months ago

Responder

Responder is a spoofing tool that can ultimately lead to gaining hashed or even cleartext passwords. It works by acting as an authentication server and responds to various network protocols asking for a authentication credentials. Responder supports the following protocols for both IPV4 and IPV6:

  • SMB

  • MSSQL

  • HTTP

  • HTTPS

  • LDAP

  • DCE-RPC

  • FTP, POP3, IMAP, SMTP

  • DNS server.

  • WPAD Proxy Server.

Responder is great for running on internal networks to capture credentials. The following command will run responder in verbose mode on the "eth0" interface and also force NTLM and Basic authentication (weak forms of authentication), where possible.

./Responder.py -I eth0 -Pv

When there is a requirement to be more stealthy, Responder can be executed in analyse mode which allows the viewing of requests, but will not spoof them:

responder -I eth0 --analyze

https://github.com/lgandx/Responder