- Start — launch the process with sudo, log it to scan history, begin output monitoring.
- Stop — terminate the process with
pkill, update scan history. - Output — read the output file at a given byte offset for incremental polling (avoids re-reading from the start).
- Status — check whether the process is running and which interface it is bound to.
Responder
Responder poisons LLMNR/NBT-NS/mDNS queries and captures NTLM hashes and cleartext credentials. Captured credentials are automatically parsed and stored in the credentials database.POST /api/responder/start
Starts Responder with the given interface and options.Network interface name to bind Responder to (e.g.
tun0, eth0).Array of additional Responder flags (e.g.
["-wrf"] for WPAD + fingerprinting). Each flag is a separate string element.Sudo password for privilege escalation.
"success" on launch.OS PID of the Responder process.
Basename of the output log file in
recon/ (e.g. responder_20240115_143200.txt).The full sudo command executed.
POST /api/responder/stop
Terminates the Responder process.PID returned by
/api/responder/start.Sudo password for the
pkill command.{"status": "success", "message": "Responder stopped"}
GET /api/responder/output
Returns output from the Responder log file starting at a byte offset. Call repeatedly with increasing offsets to implement live streaming.Filename in
recon/ (basename only, as returned by the start endpoint).Byte offset to start reading from. Defaults to
0. Use the file_size from the previous response as the next offset."success".New output since the last offset. Empty string if no new data.
Current total file size in bytes. Use as the next
offset value.GET /api/responder/status
Returns the list of currently running Responder processes."success".true if at least one Responder process is active.Array of process info objects.
GET /api/responder/config
Reads and parses the Responder configuration file (typically/usr/share/responder/Responder.conf).
Absolute path to
Responder.conf."success".Parsed config as a nested object:
{"SectionName": {"Key": "Value", ...}}.
Mirrors the INI-style structure of Responder.conf with sections like Responder Core, Servers, HTTP Options, etc.The config file path that was read.
POST /api/responder/config
Writes an updated Responder configuration. Uses sudo to overwrite the config file.Absolute path to
Responder.conf.Full config as a nested object matching the structure returned by
GET /api/responder/config.Sudo password for writing to the system config file.
{"status": "success"}
mitm6
mitm6 performs IPv6 DHCPv6 spoofing to intercept DNS queries and relay credentials to LDAP/SMBv2.POST /api/mitm6/start
Starts mitm6 on the given interface.Network interface (e.g.
eth0).Additional mitm6 flags (e.g.
["-d", "corp.local"] to restrict to a specific domain).Sudo password.
"success".OS PID.
Log file basename in
recon/.Command executed.
POST /api/mitm6/stop
Terminates the mitm6 process.PID returned by
/api/mitm6/start.Sudo password for
pkill.{"status": "success", "message": "mitm6 stopped"}
GET /api/mitm6/output
Returns mitm6 log output starting at a byte offset. Same incremental polling pattern as Responder.Log file basename.
Byte offset. Defaults to
0."success".New output since the offset.
Current file size in bytes.
GET /api/mitm6/status
Returns currently running mitm6 processes.true if any mitm6 process is active.Array of process info objects.
ASRepCatcher
ASRepCatcher intercepts Kerberos AS-REQ/AS-REP exchanges. Supports two modes:- relay — relay AS-REP hashes to capture and forward authentication.
- listen — passive mode, capture AS-REP hashes from network traffic.
POST /api/asrepcatcher/start
Starts ASRepCatcher in the specified mode.Network interface. Optional; defaults to the system’s primary interface.
Operation mode:
"relay" (default) or "listen".Additional ASRepCatcher flags as an array of strings.
Sudo password. ASRepCatcher requires root to bind to the network.
"success" on launch.OS PID.
Log file basename in
recon/.Command executed.
POST /api/asrepcatcher/stop
Terminates the ASRepCatcher process.PID returned by
/api/asrepcatcher/start.Sudo password for
pkill.{"status": "success", "message": "ASRepCatcher stopped"}
GET /api/asrepcatcher/output
Returns ASRepCatcher log output from the given byte offset.Log file basename in
recon/.Byte offset. Defaults to
0."success".New output since the offset.
Current file size in bytes.
GET /api/asrepcatcher/status
Returns currently running ASRepCatcher processes.true if any ASRepCatcher process is active.Array of process info objects.