LLMNR, NBT-NS Poisoning
ABOUT
Imagine a situation: you need to connect to some local domain, website, or SMB share. You misclicked one letter and instead of some \\mil-stash
share you wrote \\mel-stash
and first request goes to DNS server, but it doesn't know who the hell is \\mel-stash
, so it sending a broadcast request (works same as ARP, just where ARP connects MAC to IP, LMMNR connects names to IP's). And that's the place where we come in with Responder (UNIX) or Inveigh (Windows) to poison these requests and to make target think that our IP is the right one. It tries to authenticate and sends hash which we can crack with Hashcat.
RESPONDER
MOSTLY LINUX TOOL (BUT THERE IS WIN VERSION)
Overview
Responder is a powerful tool used for LLMNR/NBT-NS poisoning, capable of capturing NTLMv1/NTLMv2 hashes from network traffic. It can operate in both Analysis (passive) mode and Poisoning (active) mode.
Running Responder
To display available options, use:
To start Responder with default settings:
Common Flags
-A
: Analyze mode (passive monitoring without responding)-I <interface>
: Specify network interface-w
: Start WPAD rogue proxy server
Capturing Hashes
Responder listens for authentication requests and captures NTLM hashes when a target attempts to authenticate. These hashes are saved in:
Hashes are stored in the format:
Example captured log files:
Cracking NTLMv2 Hashes with Hashcat
INVEIGH
WINDOWS TOOL
Overview
Inveigh is a PowerShell/C# tool similar to Responder, used for LLMNR, NBNS, and SMB relay attacks on Windows networks.
Running Inveigh (PowerShell Version)
Key Features:
Captures NTLM hashes via LLMNR/NBT-NS spoofing
Supports multiple protocols (DNS, mDNS, SMB, HTTP, LDAP, WebDAV)
Can output logs to a file (
C:\Tools
directory)
Running Inveigh (C# Version)
The C# version (Inveigh.exe
) is more stable and is the recommended option.
Default enabled options:
LLMNR & NBNS Spoofing
HTTP/HTTPS Authentication Capture (NTLM)
SMB & LDAP Listening
Interacting with Inveigh
While running Inveigh, press ESC to open the interactive console.
Useful Commands:
Cracking NTLMv2 Hashes with Hashcat
Last updated