Android-Responder: running Responder.py in an Android (rooted) device - Penetration Testing in Linux
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. Prerequisites Rooted android phone Installed NetHunter or qPython Usage git clone git@github.com :nvssks/Android-Responder.git cd Android-Responder git submodule update –init –recursive Copy everything in Android – Responder needs to be in the same $DIR as the scripts Android with qPython: ~$ su -c sh $DIR/startTether.sh ~$ su -c sh $DIR/stopTether.sh Kali NetHunter: ~$ su -c bootkali root@kali:/# bash $DIR/startTether.sh root@kali:/# bash $DIR/stopTether.sh Note : Due to some limitations on older Android environments, startTether.sh needs to be stoped with Ctrl+C before running stopTether.sh The script’s execution steps. These enable tethering by setting up the network and running Responder. The captured hash (in yellow) and other poi