30 Bird - Stealing Hashes with Responder

Overview

For this exercise, you will need the Windows 10, Windows Server 2016, and Kali VMs. You'll use Responder to steal authentication hashes by exploiting local name resolution protocols.

Kali showing Responder in Analyze mode