Skip to Content
Kali Linux 2018: Windows Penetration Testing - Second Edition
book

Kali Linux 2018: Windows Penetration Testing - Second Edition

by Wolf Halton, Bo Weaver
October 2018
Intermediate to advanced
404 pages
8h 50m
English
Packt Publishing
Content preview from Kali Linux 2018: Windows Penetration Testing - Second Edition

Using Responder with Metasploit

Now we are going to use Responder and send the captures to running Metasploit modules. This way, the credentials will be saved to the Metasploit database and the captured credentials can be used when running exploits from Metasploit. Basically, what we are going to do is disable the capture servers that come with the Responder toolkit, and run the same servers using Metasploit's capture servers.

To disable the Responder's servers, we'll edit the Responder configuration file. The file is found at /etc/responder/Responder.conf. Open the file in your favorite text editor. At the top of the file, you see the list of servers with the configuration set to On-change these settings to Off and save the file:

The following ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition

Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition

Shiva V. N. Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali
Hands-On AWS Penetration Testing with Kali Linux

Hands-On AWS Penetration Testing with Kali Linux

Karl Gilbert Gupta, Benjamin Caudill

Publisher Resources

ISBN: 9781788997461Other