Android-Responder: running Responder.py in an Android (rooted) device - Penetration Testing in Linux
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in
HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting
NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP
authentication.
Prerequisites
Rooted android phone
Installed NetHunter or qPython
Usage
git clone git@github.com:nvssks/Android-Responder.git
cd Android-Responder
git submodule update –init –recursive
Copy everything in Android – Responder needs to be in the same $DIR as the scripts
Android with qPython:
~$ su -c sh $DIR/startTether.sh
~$ su -c sh $DIR/stopTether.sh
Kali NetHunter:
~$ su -c bootkali
root@kali:/# bash $DIR/startTether.sh
root@kali:/# bash $DIR/stopTether.sh
Note: Due to some limitations on older Android environments, startTether.sh needs to be stoped with Ctrl+C before running stopTether.sh
The script’s execution steps. These enable tethering by setting up the network and running Responder.
The captured hash (in yellow) and other poisoned responses.
Video
shows a Windows 10 lock screen (fresh install) connected to an Android
device running Responder.py. Host laptop is not connected to any other
network (wifi or ethernet)
Comments
Post a Comment