Podcast
Questions and Answers
What hash version was passed to Responder?
What hash version was passed to Responder?
What type of file is created in the example?
What type of file is created in the example?
What is used to crack the password in the example?
What is used to crack the password in the example?
What is the password that John the Ripper successfully cracks?
What is the password that John the Ripper successfully cracks?
Signup and view all the answers
What ruleset is used with John the Ripper in the example?
What ruleset is used with John the Ripper in the example?
Signup and view all the answers
What can be accessed using the credentials obtained?
What can be accessed using the credentials obtained?
Signup and view all the answers
What is Winexe used for?
What is Winexe used for?
Signup and view all the answers
What can Winexe be used to do on the target system?
What can Winexe be used to do on the target system?
Signup and view all the answers
What is the initial step in getting passwords with Responder?
What is the initial step in getting passwords with Responder?
Signup and view all the answers
What is observed on the Windows system during this process?
What is observed on the Windows system during this process?
Signup and view all the answers
What is obtained from the output on the Kali box?
What is obtained from the output on the Kali box?
Signup and view all the answers
What is done with the obtained hash?
What is done with the obtained hash?
Signup and view all the answers
Why is CTRL-C pressed on the Responder window?
Why is CTRL-C pressed on the Responder window?
Signup and view all the answers
What is the purpose of dumping hashes out of Responder?
What is the purpose of dumping hashes out of Responder?
Signup and view all the answers
What are the two new files generated after dumping hashes out of Responder?
What are the two new files generated after dumping hashes out of Responder?
Signup and view all the answers
What type of hash can be seen on the next slide?
What type of hash can be seen on the next slide?
Signup and view all the answers
What was the purpose of creating NetNTLMv1 and NetNTLMv2 hashes?
What was the purpose of creating NetNTLMv1 and NetNTLMv2 hashes?
Signup and view all the answers
What is used to add randomness to the NTLMv1 hash?
What is used to add randomness to the NTLMv1 hash?
Signup and view all the answers
What happens when a client connects to a host using NTLMv1?
What happens when a client connects to a host using NTLMv1?
Signup and view all the answers
What is the purpose of the second nonce in NTLMv2?
What is the purpose of the second nonce in NTLMv2?
Signup and view all the answers
How does NTLMv2 protect against rainbow tables?
How does NTLMv2 protect against rainbow tables?
Signup and view all the answers
What is the purpose of using Responder in capturing hashes?
What is the purpose of using Responder in capturing hashes?
Signup and view all the answers
Why is using a fixed challenge on the server side beneficial when capturing hashes?
Why is using a fixed challenge on the server side beneficial when capturing hashes?
Signup and view all the answers
Where can the latest version of Responder be obtained?
Where can the latest version of Responder be obtained?
Signup and view all the answers
What is the purpose of running the Get-ComputerDetail.ps1 script?
What is the purpose of running the Get-ComputerDetail.ps1 script?
Signup and view all the answers
What is needed to perform certain activities on the domain?
What is needed to perform certain activities on the domain?
Signup and view all the answers
What is the purpose of running the Invoke-Portscan.ps1 script?
What is the purpose of running the Invoke-Portscan.ps1 script?
Signup and view all the answers
What is the tool used to spoof LLMNR and NetBIOS Name Services responses?
What is the tool used to spoof LLMNR and NetBIOS Name Services responses?
Signup and view all the answers
What is used to crack credentials?
What is used to crack credentials?
Signup and view all the answers
What is the purpose of the PowerView.ps1 script?
What is the purpose of the PowerView.ps1 script?
Signup and view all the answers
What is required to perform some activities on the domain?
What is required to perform some activities on the domain?
Signup and view all the answers
What is the purpose of using cmdlets like Invoke-WebRequest and Invoke-Expression?
What is the purpose of using cmdlets like Invoke-WebRequest and Invoke-Expression?
Signup and view all the answers
What is the main theme of the summary?
What is the main theme of the summary?
Signup and view all the answers
What are the two ways Evil-WinRM can bring over code?
What are the two ways Evil-WinRM can bring over code?
Signup and view all the answers
What does the -s flag specify in Evil-WinRM?
What does the -s flag specify in Evil-WinRM?
Signup and view all the answers
What can be loaded from the script directory in Evil-WinRM?
What can be loaded from the script directory in Evil-WinRM?
Signup and view all the answers
What happens when we type 'menu' in Evil-WinRM?
What happens when we type 'menu' in Evil-WinRM?
Signup and view all the answers
What is the purpose of Bypass-4MSI in Evil-WinRM?
What is the purpose of Bypass-4MSI in Evil-WinRM?
Signup and view all the answers
How do you run a script in Evil-WinRM?
How do you run a script in Evil-WinRM?
Signup and view all the answers
What is included in the tool by default in Evil-WinRM?
What is included in the tool by default in Evil-WinRM?
Signup and view all the answers