Responder - Windows Exploitation Tool null Bangalore Meet 14 July 2018 Combined null/OWASP/G4H meet
Abstract
Responder - A rogue server creating tool (to dump Windows' password hashes).
Kindly have basic idea about DNS resolutions, LLMNR and WPAD
References:
https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/
Additional tools:
Multirelay: to perform SMBRelay attack.
Mimikatz: Post exploitation tool.John the Ripper: To break common passwords.
Hashcat: GPU based password hash cracking.
Speaker
<aamer value="profile" ref="Kashmir" location="dXB".currentPlace="Dubai" action='webDeveloper' position='penTester' workOnClick=Mercedes.Benz.value(former) onfocus_employer="etisalat" [email protected]> ♡ n|u </aamer>
Contact me via Telegram (https://AamerShah.t.me) or LinkedIn only.
Timing
Starts at Saturday July 14 2018, 12:45 PM. The sessions runs for 30 minutes.