LLMNR Poisoning

  • A Man-in-the-Middle attack on Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) broadcasts

  • This attack may provide low-privileged or administrative level password hashes that can be cracked offline or even cleartext credentials.

  • LLMNR and NBT-NS are Microsoft Windows components that serve as alternate methods of host identification that can be used when DNS fails.

  • LLMNR is a protocol that allows both IPv4 and IPv6 hosts

  • If a machine attempts to resolve a host but DNS resolution fails, typically, the machine will try to ask all other machines on the local network for the correct host address via LLMNR. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. It uses port 5355 over UDP natively.

  • If LLMNR fails, the NBT-NS will be used. NBT-NS identifies systems on a local network by their NetBIOS name. NBT-NS utilizes port 137 over UDP.

  • You dont need to be local admin.

Issue

  • When LLMNR/NBT-NS are used for name resolution, ANY host on the network can reply.

  • So, we can an authoritative name resolution source in the broadcast domain by replying to LLMNRand NBT-NS as if we know the answer.

  • The victim will share their NetNTLM hash if the requested host requires authentication actions.

  • We can then take the hash and try to crack it offline or use it in SMB relay attack or use it in different protocol like LDAP on the same host.

  • LLMNR/NBNS spoofing combined with a lack of SMB signing can often lead to administrative access on hosts within a domain.

  • For linux, we will use Responder and for windows we will use Inveigh

Attack from Linux

 # /usr/share/responder/logs is the logs dir where it will store hashes etc
 sudo responder -I <interface>
 
 # When a device is set to "Auto-detect" proxy settings, it will try to find a 
 # WPAD server on the network. The -w flag in Responder starts a rogue WPAD server.
 # WPAD is a protocol that allows clients to automatically discover and configure proxy 
 # settings. When a device (e.g., a Windows machine) tries to detect a proxy server, it 
 # will send a WPAD request on the network. If Responder is running with the -w flag, it will 
 # respond to this request with a malicious wpad.dat file. This file contains instructions
 # telling the client to use the attacker’s proxy (the one running Responder) for all web traffic.

Note:

Cracking NTLMv2 hashes using Hashcat:

Attack from Windows

Last updated