This script generates a payload for use with Responder.
- Generate a payload with
main.py - Copy and paste the one-liner output into the
WPADScriptfield ofResponder.conf.
test@test:~$ python3 main.py --help
usage: main.py [-h] [-o OUT] cmd
This script generates a payload for use with Responder.
main.pyWPADScript field of Responder.conf.test@test:~$ python3 main.py --help
usage: main.py [-h] [-o OUT] cmd
| #!/usr/bin/env python3 | |
| # -*- coding: utf-8 -*- | |
| # References: | |
| # 1. https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/ | |
| # 2. https://room362.com/post/2016/smb-http-auth-capture-via-scf/ | |
| from argparse import ArgumentParser | |
| from configparser import RawConfigParser |
| ### Keybase proof | |
| I hereby claim: | |
| * I am jthuraisamy on github. | |
| * I am jthuraisamy (https://keybase.io/jthuraisamy) on keybase. | |
| * I have a public key whose fingerprint is 3CC0 1B4C 2920 F44E 8973 2DFD 764F 2E48 2337 A611 | |
| To claim this, I am signing this object: |