LLMNR Poisoning
From Linux
https://github.com/SpiderLabs/Responder
Wait for hashes to come in Crack them withFrom Windows
Using Inveigh
https://github.com/Kevin-Robertson/Inveigh
C# Inveigh (InveighZero)
We can quickly view unique captured hashes by typingGET NTLMV2UNIQUE
. We can type in GET NTLMV2USERNAMES
and see which usernames we have collected. This is helpful if we want a listing of users to perform additional enumeration against and see which are worthattempting to crack offline using Hashcat.
Mitigation
- Select "Turn OFF multicast Name Resolution" under Local Computer Policy > Computer Configuration > Administrative Templates > Network > DNS Client in the Group Policy Editor
- Disable NBT-NS navigate to Network Connections > Network Adapter Properties > TCP/IPv4 Properties > Advanced tab > WINS tab and select "Disable NetBios over TCP/IP". If you cannot disable for whatever reason
- Require Network Access Control (NAC)
- Require strong passwords: over 14 characters with capitals and symbols and no common words. The better the password, the longer it takes an attacker to crack the hash