This script generates a payload for use with Responder.
- Generate a payload with
main.py
- Copy and paste the one-liner output into the
WPADScript
field ofResponder.conf
.
test@test:~$ python3 main.py --help
usage: main.py [-h] [-o OUT] cmd
This script generates a payload for use with Responder.
main.py
WPADScript
field of Responder.conf
.test@test:~$ python3 main.py --help
usage: main.py [-h] [-o OUT] cmd
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# References: | |
# 1. https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/ | |
# 2. https://room362.com/post/2016/smb-http-auth-capture-via-scf/ | |
from argparse import ArgumentParser | |
from configparser import RawConfigParser |
### Keybase proof | |
I hereby claim: | |
* I am jthuraisamy on github. | |
* I am jthuraisamy (https://keybase.io/jthuraisamy) on keybase. | |
* I have a public key whose fingerprint is 3CC0 1B4C 2920 F44E 8973 2DFD 764F 2E48 2337 A611 | |
To claim this, I am signing this object: |