On 3a, I wrote about LLMNR/NBT-NS Poisoning from Linux using Responder.
Basically, attacker is spoofing as LLMNR/NBT-NS when DNS fails, and sends out fake response to collect password hashes.
This time, we will use Inveighto do the same on Windows.
【Inveigh】
- written in Powershell and C#
- Listen to protocols including, LLMNR, DNS, mDNS, NBNS, DHCPv6, ICMPv6, HTTP, HTTPs, SMB, LDAP, WebDAV, and Proxy Auth.
Usage
For LLMNR and NBNS spoofing:
InveighZero
Powershell version of inveigh is the original version but is no longer updated. However C# version is still maintained.
We can hit ESC
to enter interactive console.
HELP
shows several options:
GET NTLMV2UNIQUE
: View captured hashes
GET NTLMV2USERNAMES
: View usernames
Moving on
Now through 3a,b LLMNR/NBT-NS poisoning, we have captured and cracked hashes for several accounts.
Now it’s time to use this hashes:
- Bloodhound
- Password Spraying