From linux host
We can use responder to do LLMNR poisoning from linux host.
sudo responder -I ens224 -AUsed to start responding to & analyzing LLMNR, NBT-NS and MDNS queries on the interface specified proceeding the -I option and operating in Passive Analysis mode which is activated using -A. Performed from a Linux-based host.
We can crack hashes using hashcat
hashcat -m 5600 forend_ntlmv2 /usr/share/wordlists/rockyou.txtLast updated