LLMNR Poisoning
From Linux
https://github.com/SpiderLabs/Responder
Wait for hashes to come in Crack them withFrom Windows
Using Inveigh
https://github.com/Kevin-Robertson/Inveigh
C# Inveigh (InveighZero)
We can quickly view unique captured hashes by typingGET NTLMV2UNIQUE. We can type in GET NTLMV2USERNAMES and see which usernames we have collected. This is helpful if we want a listing of users to perform additional enumeration against and see which are worthattempting to crack offline using Hashcat.
Abuse
Once you receive a response:
you can either crack the Net-NTLMv2 hash
- See: Hash Cracking
Or relay the to authenticate to a service
- See: Relay Attacks
Mitigation
- Select "Turn OFF multicast Name Resolution" under Local Computer Policy > Computer Configuration > Administrative Templates > Network > DNS Client in the Group Policy Editor
- Disable NBT-NS navigate to Network Connections > Network Adapter Properties > TCP/IPv4 Properties > Advanced tab > WINS tab and select "Disable NetBios over TCP/IP". If you cannot disable for whatever reason
- Require Network Access Control (NAC)
- Require strong passwords: over 14 characters with capitals and symbols and no common words. The better the password, the longer it takes an attacker to crack the hash