- A tool that detects the presence of a Responder in the network
- Identifies compromised machines before hackers run away with the loot (hashes)
It sends LLMNR name resolution requests for made-up hostnames that do not exist. In a normal non-adversarial network we do not expect such names to resolve. However, a responder, if present in the network, will resolve such queries and therefore will be forced to reveal itself.
Running respounder is as simple as invoking it on the command line. Example invocation:
Typical usage scenario
Detect rogue hosts running responder on public Wi-Fi networks e.g. like airports, cafés and avoid joining such networks (especially if you are running Windows OS)
Detect network compromises as soon as they happen by running respounder in a loop
For eg., the following run crontab respounder every minute and log a JSON file to syslog whenever a responder is detected.
* * * * * /path/to/respounder -json | /usr/bin/logger -t responder-detected
Example syslog entry: