LLMNR Poisoning
Last updated
Last updated
Windows infrastructure (Active Directory) depends heavily on name resolution. Attackers may be able to trick a victim into attempting authentication against them instead of a server under certain conditions.
Its own name?
In NetBIOS cache?
%Systemroot%\System32\Drivers\Etc\hosts
DNS
%Systemroot%\System32\Drivers\Etc\lmhosts.sam
LLMNR
NetBIOS
link local multi-casting name resolution is used to identify hosts when DNS fails to do so .previously known as NBT-NS (netbios). key flaw is that the srvices utilize a users username and NTLMv2 hash when apropriately responded to.
we use the responder to sniff the request while inside the network this is the first tool to run even before nmap or nessus because we want to listen to as much traffic as we can and scanners themselves are going to generate a lot of traffic and will cause a lot of responses back to our machine.
then we crack the hash with hashcat :