A network poisoning tool that captures authentication credentials by spoofing LLMNR, NBT-NS, and mDNS responses.
Responder is a network poisoning tool that intercepts LLMNR, NBT-NS, and mDNS queries to capture authentication credentials. It works by spoofing responses to redirect clients to rogue servers, allowing security professionals to harvest NTLM hashes and clear-text passwords during penetration tests.
Penetration testers, red teamers, and network security researchers who need to assess credential exposure and network vulnerabilities in Windows and mixed environments.
Responder provides a comprehensive, all-in-one solution for credential capture across multiple protocols, with built-in stealth features to avoid disrupting legitimate network services while effectively harvesting authentication data.
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Simultaneously poisons LLMNR, NBT-NS, and mDNS while running built-in servers for HTTP, SMB, MSSQL, and more, enabling credential capture across diverse network services as detailed in the README.
Defaults to answering only File Server Service queries to avoid breaking legitimate NBT-NS behavior, with options to fine-tune poisoning for reconnaissance without full disruption.
Captures hashes in John Jumbo-compliant files and logs all activity to SQLite databases and session logs, providing organized data for analysis as per the README's hashes section.
Includes analyze mode for passive network monitoring and fingerprinting to map hosts and services without active poisoning, useful for reconnaissance phases.
This version is marked as deprecated with active development moved elsewhere, meaning users may miss bug fixes, new features, or security updates.
Requires stopping services like Samba on Linux, modifying NetworkManager settings on Ubuntu, and careful configuration to avoid port conflicts, as noted in the Considerations section.
Explicitly not designed to work on Windows, limiting its use for testers on that platform and forcing reliance on Linux or macOS environments.
Using options like -r or -d can answer to broader queries, which the README warns will 'likely break stuff on the network,' making it unsuitable for stable production environments.