October 2018
Intermediate to advanced
404 pages
8h 50m
English
Now we are going to use Responder and send the captures to running Metasploit modules. This way, the credentials will be saved to the Metasploit database and the captured credentials can be used when running exploits from Metasploit. Basically, what we are going to do is disable the capture servers that come with the Responder toolkit, and run the same servers using Metasploit's capture servers.
To disable the Responder's servers, we'll edit the Responder configuration file. The file is found at /etc/responder/Responder.conf. Open the file in your favorite text editor. At the top of the file, you see the list of servers with the configuration set to On-change these settings to Off and save the file:
The following ...