Skip to content

A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)

Notifications You must be signed in to change notification settings

joda32/got-responded

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

  ______  _____    __         _____   ______  ______  _____  _____  ____   _  _____   ______  _____   
 |   ___|/     \ _|  |_  ___ |     | |   ___||   ___||     |/     \|    \ | ||     \ |   ___||     \  
 |   |  ||     ||_    _||___||     \ |   ___| `-.`-. |    _||     ||     \| ||      \|   ___||      \ 
 |______|\_____/  |__|       |__|\__\|______||______||___|  \_____/|__/\____||______/|______||______/
 
Author: @_w_m__   
A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)

gif

What is it?

Pentesters, Redteamers and even real attackers love to use tools like Responder to spoof LLMNR and/or NBT-NS responses. There are some awesome other tools to help with detection, such as respounder. But I wanted to figure it out for myself, and at the same time add a way to push "honey" tokens (fake AD credentials) to people using these spoofing tools.

How to install

git clone https://github.com/joda32/got-responded.git
cd got-responded
python3 -m venv responded-env
source responded-env/bin/activate
pip install -r requirements.txt

How to use it

Simple mode

This will start it in default mode, will check for both LLMNR and NBT-NS spoofing, but will not send fake SMB creds

python got-responded.py

About

A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages