llmnr-nbt-ns-poisoning-from-linux
Tool Overview
Responder
Inveigh
Metasploit
Pre-Attack Network Scanning
Identify hosts responding to NetBIOS name service
Scan for LLMNR-enabled hosts on the network
Responder Usage Examples
Display help information for Responder
Run Responder on interface eth0 with SMB and HTTP capture enabled
Run Responder in analysis mode
Run Responder on a specific interface (eth0)
Run Responder on interface ens224
View captured hashes in Responder logs
Hashcat Usage Examples
Crack NTLMv2 hashes using Hashcat with RockYou wordlist
Run Hashcat in the background for long processes
Post-Exploitation Considerations
Use cracked credentials for lateral movement or privilege escalation (example with SMB)
Defensive Measures
Disable LLMNR and NBT-NS to prevent poisoning attacks
1. LLMNR and NBT-NS Fundamentals:
2. Man-in-the-Middle (MitM) Attack:
3. Responder Tool:
4. Attack Flow:
5. NTLM Hashes:
6. Tools and Techniques:
7. Security Implications:
PreviousDomainPasswordSpray - Active Directory Password SprayingNextllmnr-nbt-ns-poisoning-from-windows
Last updated