Войти
  • 18369Просмотров
  • 4 года назадОпубликованоInfinite Logins

How to Capture Net-NTLMv2 Hashes Using DHCP w/ Responder

We've discussed how to use Responder to capture Net-NTLMv2 hashes using protocols like LLMNR before, but the latest version now allows for DHCP poisoning, a phenomenally effective method. Disclaimer: This content is intended to be consumed by cyber security professionals, ethical hackers, and penetration testers. Any attacks performed in this video should only be performed in environments that you control or have explicit permission to perform them on. 👇 SUBSCRIBE TO INFINITELOGINS YOUTUBE CHANNEL NOW 👇 00:00 - Intro 01:37 - Explaining DHCP 03:00 - Explaining WPAD 04:40 - Visualizing the Attack 08:48 - Configuring Responder 12:20 - Running the Attack 16:12 - Cracking NTLMv2 Hashes 19:23 - Wrapping Up Blog post mentioned in video: ___________________________________________ Social Media: Website: Twitter: Twitch: ___________________________________________ Donations and Support: Like my content? Please consider supporting me on Patreon: Get $100 in free Digital Ocean credit. Purchase a VPN Using my affiliate link ___________________________________________ Tags: #Responder #Python #DHCP