Hijacking NTLM-powered Mobile Apps (Part 1 - Cracking with Responder)
Common Information
Type Value
UUID ad9056e3-2f5b-4d0b-9bfd-928d23e6825d
Fingerprint 3e82ab5b4d62f68c
Analysis status DONE
Considered CTI value 0
Text language
Published Sept. 30, 2018, midnight
Added to db Jan. 18, 2023, 9:49 p.m.
Last updated Nov. 17, 2024, 6:30 p.m.
Headline Hijacking NTLM-powered Mobile Apps (Part 1 - Cracking with Responder)
Title Hijacking NTLM-powered Mobile Apps (Part 1 - Cracking with Responder)
Detected Hints/Tags/Attributes 42/1/17
Attributes
Details Type #Events CTI Value
Details Domain 397
asp.net
Details Domain 707
google.com
Details Domain 1
clone-ssl.py
Details Domain 5
http.py
Details Domain 27
responder.py
Details File 1
clone-ssl.py
Details File 32
ca.crt
Details File 7
ca.key
Details File 7
client.crt
Details File 7
client.key
Details File 5
http.py
Details File 2
responder.crt
Details File 2
responder.key
Details File 25
responder.py
Details IPv4 4
192.168.12.1
Details IPv4 619
0.0.0.0
Details Url 1
https://google.com/mobileapp/veryvuln.svc