evil-ssdp
Spoof SSDP replies to phish for NTLM hashes on a network. Responds to SSDP multicast discover requests, posing as a generic UPNP device that appears in Windows Explorer.
Description
evil-ssdp is a tool designed to spoof SSDP (Simple Service Discovery Protocol) replies, impersonating a generic UPNP device on the local network. When users on Windows machines in the network perform device discovery, the spoofed device magically appears in Windows Explorer, tempting users to interact with it. Upon opening the device, victims are presented with a configurable phishing webpage aimed at capturing NTLM hashes.
This tool is particularly useful in penetration testing and red team engagements for capturing credentials via NTLM authentication on Windows networks. It leverages the common trust users place in network-discovered devices, making it effective for social engineering attacks without requiring direct user interaction beyond curiosity-driven clicks.
The phishing pages and XML responses are customizable through templates, allowing adaptation to specific targets like Office 365 logins.
How It Works
The tool listens on a specified network interface for SSDP multicast discover requests (M-SEARCH messages). Upon receiving these, it responds with spoofed SSDP replies containing UPNP device descriptions, advertising a fake device. The spoofed device's location points to a local HTTP server (default port 8888) hosting XML descriptions and phishing pages. When a user accesses the device in Windows Explorer, it triggers NTLM authentication attempts to a configured SMB server, leaking hashes. Templates define the XML structure and phishing content served.
Installation
sudo apt install evil-ssdpFlags
Examples
evil-ssdp -hevil-ssdp eth0evil-ssdp -p 8080 wlan0evil-ssdp -t custom-template eth0evil-ssdp -s 192.168.1.100 eth0evil-ssdp -p 8888 -t office365 -s 10.0.0.5 wlan1evil-ssdp -r DOMAIN.COM eth0