Thanks for the video, one thing I don't get is how the attack is triggered. For example example at 05:41 you type in the IP into the file explorer, but surely people won't come back from lunch and just do that? So what actually triggers the traffic for responder?
Hi Patrick and thank you for the video! I was wondering, what more can this tool do? When I tried playing with it a little bit, I noticed that there are flags for some other functions. For example, what exactly does the DHCP and DHCP-DNS flag do? This tool is also listed as a DNS/mDNS and WPAD spoofing tool. How does that work, and how do I use those features of the tool?
Thank you for the comment and you’re very welcome. The best thing to do is run the tall and use the help switch you can see other flags that you can utilize
Excellent video, cleared up my issue I was having with responder! I also didn't realize that if the user inputs a true user into one of the input fields it will capture their hashes as well. If I said that wrong, please correct me! Thanks again!
Thank you I appreciate that. I’m glad it was helpful. It’s an awesome tool. And yes it captures the hash. You got that right. And you’re very welcome. I appreciate you checking out the video and hopefully other videos. I have are helpful for you. Thank you for watching.
Nice work pat love the live demos.
More to come!
NIce work Pat, loving these videos
Thanks 👍
keep up the good work pat
Thank you Paul
so uh, whatcha usin tails for? hmmm?
Very clear explanation thx
Glad it was helpful! Thank you
Thank you so much bro❤
Thanks for the video, one thing I don't get is how the attack is triggered.
For example example at 05:41 you type in the IP into the file explorer, but surely people won't come back from lunch and just do that? So what actually triggers the traffic for responder?
Thank you Pat
You’re so welcome. I’m glad it helps :)
Thanks👍
Welcome 👍
Sir please make a video how to get reverse shell using usb rubber ducky for cmd access with kali linux
Thank you sir ❤
Hi Patrick and thank you for the video!
I was wondering, what more can this tool do? When I tried playing with it a little bit, I noticed that there are flags for some other functions. For example, what exactly does the DHCP and DHCP-DNS flag do? This tool is also listed as a DNS/mDNS and WPAD spoofing tool. How does that work, and how do I use those features of the tool?
Thank you for the comment and you’re very welcome. The best thing to do is run the tall and use the help switch you can see other flags that you can utilize
Thanks for posting. What system setup do you use to alternate between linux/windows machines like that? Thanks.
You’re welcome anytime. I use Virtual box or VMware workstation
All I think off is John wick every time you say John
Haha that’s awesome.
My responder isn't capturing LLMNR or NBT-NS responses, what do I do?
Are there any responder and john the ripper for android?
Yes you would have to use the terminal and install.
Excellent video, cleared up my issue I was having with responder! I also didn't realize that if the user inputs a true user into one of the input fields it will capture their hashes as well. If I said that wrong, please correct me! Thanks again!
Thank you I appreciate that. I’m glad it was helpful. It’s an awesome tool. And yes it captures the hash. You got that right. And you’re very welcome. I appreciate you checking out the video and hopefully other videos. I have are helpful for you. Thank you for watching.
I'm not able to get windows credentials and getting error please help me
Hey bro.. I notced about your ip addreses not work XD... just restart your browser even open ip addreses
thx video
Why do you hit the poor keyboard so hard dude....
I don’t haha. It just sounds loud sometimes.