LLMNR/NBT-NS Poisoning
Last updated
Last updated
Responder is the go-to tool for poisoning LLMNR, NBT-NS, and mDNS requests. NBT-NS, LLMNR and mDNS can broadcast queries to the entire network, but no measures are taken to verify the responses. As an attacker, we can exploit this by listening to the queries, spoofing the response, and then obtaining to the account being used to authenticate.
I always recommend running Responder in Analyze mode to begin your assessment. This will help identify DNS replacement protocols such as LLMNR and NBT-NS. Additionally, we can still capture hashes in Analyze mode, an example of this would be when a client has a 'network spider' for patch management.
Run Responder in Analyze mode first to observe traffic on the network:
After identifying the protocols, we can rerun Responder with the parameters to poison:
Recently on a penetration test I had a request from a client to be provided with only "In-Scope" hosts that were in the Responder-logs. This is because they wanted an actionable list of hosts to remediate for compliance rather than "your entire domain is rekt".
If this is ever an ask, I found out a pretty easy way to grep out hosts from IPs within scope and provide this ask to a client:
Place the in-scope hosts into a file. For this example, it will be titled InScopeHosts.txt
If the client has provided a list in CIDR notation then break these into smaller lists via your choice of tool. Personally, I like using nmap:
Grep out the Poisoners-Session log
to only IP Addresses:
Sort both files and place them into the appropriate directory.
Compare the two files using comm
: