LLMNR/NBT-NS Poisoning

Quick Example
Let's walk through a quick example of the attack flow at a very high level:
A host attempts to connect to the print server at \\print01.inlanefreight.local, but accidentally types in \\printer01.inlanefreight.local.
The DNS server responds, stating that this host is unknown.
The host then broadcasts out to the entire local network asking if anyone knows the location of \\printer01.inlanefreight.local.
The attacker (us with
Responderrunning) responds to the host stating that it is the \\printer01.inlanefreight.local that the host is looking for.The host believes this reply and sends an authentication request to the attacker with a username and NTLMv2 password hash.
This hash can then be cracked offline or used in an SMB Relay attack if the right conditions exist.
Tools
Tool
Description
Responder is a purpose-built tool to poison LLMNR, NBT-NS, and MDNS, with many different functions.
Inveigh is a cross-platform MITM platform that can be used for spoofing and poisoning attacks.
Metasploit has several built-in scanners and spoofing modules made to deal with poisoning attacks.
Both responder and inveigh can attack the following protocols: LLMNR, DNS, MDNS, NBNS, DHCP, ICMP, HTTP, HTTPS, SMB, LDAP, WebDAV, Proxy Auth
But responder also has support for:
MSSQL
DCE-RPC
FTP, POP3, IMAP, and SMTP auth
Sample Exploitation
Linux
Start Responder
Cracking NTLMv2 hash with hashcat
We now have the plaintext password of the user
Windows
Start Inveigh
Retrieve the Hash and crack it using hashcat as same as the method in linux
Last updated