LLMNR/NBT-NS Poisoning
Usage
Output In-scope Hosts from Responder
References
Last updated
Last updated
responder -I eth0 -Aresponder -I eth0 -dwP> cat in-scope.out
127.0.0.1
127.0.0.2
127.0.0.3nmap -sL -n 127.0.0.0/24 | awk '/Nmap scan report/{print $NF}’cat Poisoners-Session.log | grep -o '[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}’ > responder-ips.txtsort -u $filecomm -12 sorted-poisoners-session sorted-responder-ips