Android-Responder: running Responder.py in an Android (rooted) device - Penetration Testing in Linux

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

Prerequisites
Rooted android phone
Installed NetHunter or qPython

Usage
 
git clone git@github.com:nvssks/Android-Responder.git
 
cd Android-Responder
 
git submodule update –init –recursive

Copy everything in Android – Responder needs to be in the same $DIR as the scripts
Android with qPython:
~$ su -c sh $DIR/startTether.sh
~$ su -c sh $DIR/stopTether.sh
Kali NetHunter:
~$ su -c bootkali
root@kali:/# bash $DIR/startTether.sh
root@kali:/# bash $DIR/stopTether.sh
Note: Due to some limitations on older Android environments, startTether.sh needs to be stoped with Ctrl+C before running stopTether.sh

 

The script’s execution steps. These enable tethering by setting up the network and running Responder.

 

The captured hash (in yellow) and other poisoned responses.
Video shows a Windows 10 lock screen (fresh install) connected to an Android device running Responder.py. Host laptop is not connected to any other network (wifi or ethernet)

Comments

Popular posts from this blog

Fern Wifi Cracker: wireless security audit tools

HatCloud: bypass CloudFlare for discover real IP

onioff: Inspecting Deep Web Links

Ad