All Projects → codeexpress → Respounder

codeexpress / Respounder

Licence: apache-2.0
Respounder detects presence of responder in the network.

Programming Languages

go
31211 projects - #10 most used programming language
golang
3204 projects

Projects that are alternatives of or similar to Respounder

H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+4200.82%)
Mutual labels:  hackers
Redteam Hardware Toolkit
🔺 Red Team Hardware Toolkit 🔺
Stars: ✭ 163 (-32.92%)
Mutual labels:  hackers
Mercury
Mercury: network metadata capture and analysis
Stars: ✭ 203 (-16.46%)
Mutual labels:  network-security
Tunnel
Use Ngrok In Termux With Advanced Options
Stars: ✭ 133 (-45.27%)
Mutual labels:  hackers
Zxrequestblock
基于NSURLProtocol一句话实现iOS应用底层所有网络请求拦截(含网页ajax请求拦截【不支持WKWebView】)、一句话实现防抓包(使Thor,Charles,Burp等代理抓包方式全部失效,且即使开启了代理,也不影响App内部的正常请求)。包含http-dns解决方法,有效防止DNS劫持。用于分析http,https请求等
Stars: ✭ 160 (-34.16%)
Mutual labels:  network-security
Zazu
🚀 A fully extensible and open source launcher for hackers, creators and dabblers.
Stars: ✭ 2,060 (+747.74%)
Mutual labels:  hackers
Snap
Bash Script For Backing Up All Files In Termux With Easy step
Stars: ✭ 90 (-62.96%)
Mutual labels:  hackers
Rubyfu
Rubyfu, where Ruby goes evil!
Stars: ✭ 228 (-6.17%)
Mutual labels:  network-security
3proxy
3proxy - tiny free proxy server
Stars: ✭ 2,263 (+831.28%)
Mutual labels:  network-security
Changelog.com
Changelog is news and podcast for developers. This is our open source platform.
Stars: ✭ 2,354 (+868.72%)
Mutual labels:  hackers
Netsec Ps Scripts
Collection of PowerShell network security scripts for system administrators.
Stars: ✭ 139 (-42.8%)
Mutual labels:  network-security
Netpwn
Tool made to automate tasks of pentesting.
Stars: ✭ 152 (-37.45%)
Mutual labels:  network-security
Ivre
Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+859.26%)
Mutual labels:  network-security
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.​
Stars: ✭ 99 (-59.26%)
Mutual labels:  hackers
Onesixtyone
Fast SNMP Scanner
Stars: ✭ 218 (-10.29%)
Mutual labels:  network-security
Gohacktools
Hacker tools on Go (Golang)
Stars: ✭ 1,303 (+436.21%)
Mutual labels:  hackers
Awesome Computer History
An Awesome List of computer history videos, documentaries and related folklore
Stars: ✭ 2,149 (+784.36%)
Mutual labels:  hackers
Pskracker
An all-in-one WPA/WPS toolkit
Stars: ✭ 232 (-4.53%)
Mutual labels:  network-security
Zbang
zBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (-7.82%)
Mutual labels:  network-security
Hackercouch
Hospitality for Hackers
Stars: ✭ 185 (-23.87%)
Mutual labels:  hackers

res·pound·er

/rɪˈspaʊnd dər/ noun

  • A tool that detects presence of a Responder in the network
  • Identifies compromised machines before hackers run away with the loot (hashes)

Respounder sends LLMNR name resolution requests for made-up hostnames that do not exist. In a normal non-adversarial network we do not expect such names to resolve. However, a responder, if present in the network, will resolve such queries and therefore will be forced to reveal itself.

Download

Latest Releases

Respounder is available for 32/64 bit linux, OS X and Windows systems. Latest versions can be downloaded from the Release tab above.

Build from source

This is a golang project with no dependencies. Assuming you have golang compiler installed, the following will build the binary from scratch

$ git clone https://github.com/codeexpress/respounder
$ cd respounder
$ go build -o respounder respounder.go

Usage

Running respounder is as simple as invoking it on the command line. Example invocation:

$ ./respounder


     .´/
    / (           .----------------.
    [ ]░░░░░░░░░░░|// RESPOUNDER //|
    ) (           '----------------'
    '-'

[wlan0]    Sending probe from 192.168.0.19...   responder not detected
[vmnet1]   Sending probe from 172.16.211.1...   responder not detected
[vmnet8]   Sending probe from 172.16.55.1...    responder detected at 172.16.55.128

Flags

$ ./respounder [-json] [-debug] [-hostname testhostname | -rhostname]

Flags:
  -json
        Prints a JSON to STDOUT if a responder is detected on
        the network. Other text is sent to STDERR
  -debug
        Creates a debug.log file with a trace of the program
  -interface string
        Interface where responder will be searched (eg. eth0).
        Not specifying this flag will search on all interfaces.
  -hostname string
        Hostname to search for (default "aweirdcomputername")
  -rhostname
        Searches for a hostname comprised of random string instead
        of the default hostname ("aweirdcomputername")

Typical usage scenario

Personal

Detect rogue hosts running responder on public Wi-Fi networks e.g. like airports, cafés and avoid joining such networks (especially if you are running windows OS)

Corporate

Detect network compromises as soon as they happen by running respounder in a loop

For eg. the following crontab runs respounder every minute and logs a JSON file to syslog whenever a responder is detected.

* * * * * /path/to/respounder -json | /usr/bin/logger -t responder-detected

Example syslog entry:

[email protected]:~/$ sudo tail -f /var/log/syslog
Feb  9 03:44:07 responder-detected: [{"interface":"vmnet8","responderIP":"172.16.55.128","sourceIP":"172.16.55.1"}]

Demo

Respounder in action

Coming Up Next: Android App

There are plans to port this tool to an android app so that adversarial Wi-Fi networks (eg. WiFi Pineapple or WiFi Pumpkin running responder) can be detected right from a mobile phone.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].