Skip to content

relaxedricky/Responder-Windows

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

NBT-NS/LLMNR Responder Windows Version (Beta) Laurent Gaffie lgaffie@trustwave.com http://www.spiderlabs.com

INTRODUCTION

This tool is first an LLMNR, NBT-NS and MDNS responder, it will answer to specific NBT-NS (NetBIOS Name Service) queries based on their name suffix (see: http://support.microsoft.com/kb/163409). By default, the tool will only answers to File Server Service request, which is for SMB. The concept behind this, is to target our answers, and be stealthier on the network. This also helps to ensure that we don't break legitimate NBT-NS behavior. You can set the -r option via command line if you want this tool to answer to the Workstation Service request name suffix.

FEATURES

  • Experimental Windows Version.

  • Goal of this version is to be able to propagate compromises across subnets and domains from any compromised Windows machine. This tool can also be used compromise a domain from an external penetration test.

  • This version will disable netbios on all interfaces and the current firewall profile on the target host.

  • Default values will be turned back On when killing Responder (CRTL-C).

  • LLMNR and Netbios works out of the box on any Windows XP-2003

  • Netbios support works on all versions.

  • Best way to collect hashes with this Windows version: Responder.exe -i IP_Addr -rF

INSTALLING

  • Binary:

Just drop the executable and the configuration file (Responder.conf) inside a directory (eg: c:/temp/responder) and launch it.

  • From source: Install python on a Windows machine.

run "pip install pyinstaller"

cd in Responder source directory

pyinstaller --onefile -F Responder.py

Your binary will be located in the folder dist/

  • Executing the source direclty:

You can run Responder as usual from the source folder (with python installed): python Responder.py

CONSIDERATIONS

  • Make sure you have administrative privileges.

  • Make sure to include a conventional Responder.conf file in Responder running directory.

  • Any rogue server can be turn off in Responder.conf.

  • The Wpad proxy server is known to be buggy on some Windows versions. It's not recommended to use it.

  • For now, SMB rogue authentication server is not supported.

Follow Responder latest updates on twitter: https://twitter.com/PythonResponder

COPYRIGHT

NBT-NS/LLMNR Responder Created and maintained by Laurent Gaffie Copyright (C) 2015 Trustwave Holdings, Inc.

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/

About

Responder Windows Version Beta

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 99.5%
  • HTML 0.5%