Common Information
Type | Value |
---|---|
Value |
responder.py |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | 2024-09-05 | 397 | Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure | |||
Details | Website | 2024-09-05 | 396 | Russian Military Cyber Actors Target US and Global Critical Infrastructure | CISA | ||
Details | Website | 2024-08-15 | 2 | Oops I UDL'd it Again | ||
Details | Website | 2023-09-20 | 86 | GOLD MELODY: Profile of an Initial Access Broker | ||
Details | Website | 2023-08-03 | 2 | PenTales: A Badge, a Tag, and a Bunch of Unattended Chemicals; Why Physical Social Engineering Engagements are an Important Part of Security | Rapid7 Blog | ||
Details | Website | 2023-02-17 | 4 | Responder ile NTLM Hashi Yakalama | ||
Details | Website | 2023-01-09 | 43 | ATTACKING ACTIVE DIRECTORY | ||
Details | Website | 2022-09-16 | 40 | GitHub - lgandx/Responder: Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. | ||
Details | Website | 2022-07-20 | 16 | Analyzing Penetration-Testing Tools That Threat Actors Use to Breach Systems and Steal Data | ||
Details | Website | 2022-06-29 | 25 | CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus | ||
Details | Website | 2022-02-14 | 35 | Dropping Files on a Domain Controller Using CVE-2021-43893 | Rapid7 Blog | ||
Details | Website | 2021-05-29 | 114 | Attacking Active Directory: 0 to 0.9 | zer1t0 | ||
Details | 2020-08-23 | 202 | Operation ‘Dream Job | |||
Details | Website | 2020-06-18 | 28 | Living off the land: stealing NetNTLM hashes | ||
Details | Website | 2020-03-16 | 76 | Pen Testing Tools Cheat Sheet | ||
Details | Website | 2019-09-09 | 24 | GitHub - SpiderLabs/Responder: Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. | ||
Details | Website | 2018-09-30 | 17 | Hijacking NTLM-powered Mobile Apps (Part 1 - Cracking with Responder) | ||
Details | Website | 2018-07-18 | 2 | SKIDDIEs and PROs vs. Advanced Deception | ||
Details | Website | 2017-02-16 | 14 | All your credz are belong to me. When raspi meets wifi sniffing. | ||
Details | Website | 2016-12-20 | 33 | What is LLMNR & WPAD and How to Abuse Them During Pentest ? – Pentest Blog | ||
Details | Website | 2016-05-18 | 14 | An interesting route to domain admin- iSCSI | Pen Test Partners | ||
Details | Website | 2016-04-02 | 3 | Responder - LLMNR, MDNS and NBT-NS Poisoner - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2015-12-04 | 17 | Malicious Outlook Rules - NetSPI | ||
Details | Website | 2014-01-13 | 19 | SMB Attacks Through Directory Traversal | ||
Details | Website | 2013-11-16 | 25 | Local Network Attacks: LLMNR and NBT-NS Poisoning - Stern Security |