β£οΈLLMNR/NBT-NS Poisoning from Linux
Page 6 - LLMNR/NBT-NS Poisoning from Linux
Overview
Attack Goal
LLMNR & NBT-NS Protocol Primer
What are LLMNR & NBT-NS?
LLMNR (Link-Local Multicast Name Resolution)
NBT-NS (NetBIOS Name Service)
The Vulnerability
Attack Methodology
Attack Flow Example
Technical Details
Tools for LLMNR/NBT-NS Poisoning
Tool
Description
Platform
Supported Protocols
Responder Tool Usage
Basic Commands
Key Responder Flags
Flag
Function
Notes
Required Network Ports
Capturing Hashes with Responder
Starting a Capture Session
Hash Storage Locations
Log File Types
Hash Cracking with Hashcat
Identifying Hash Type
Basic Hashcat Cracking
Example Successful Crack
Advanced Techniques
WPAD Poisoning
Multi-Protocol Capture
Operational Considerations
Lab Exercises & Solutions
Lab Environment
Question 1: Capture Hash for User Starting with 'b'
Question 2: Crack the Previous Hash
Question 3: Capture and Crack Hash for User 'wley'
Detection and Evasion
Blue Team Detection Methods
Red Team Evasion Techniques
Common Issues & Troubleshooting
Responder Not Capturing Hashes
Hashcat Not Cracking
Network Impact
Key Takeaways
Attack Value
Defensive Recommendations
Operational Tips
Command Reference
Responder Operations
Hash Processing
Log Analysis
Last updated