Skip to content

Commit

Permalink
Update RedTeam_Hacking_Notes.md
Browse files Browse the repository at this point in the history
  • Loading branch information
Truvis authored Sep 25, 2020
1 parent 369d108 commit e2e90f8
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions RedTeam_Hacking_Notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -242,10 +242,10 @@ This type of attack can you to intercept packets and information like images for
#### LLMNR / Responder / MultiRelay
##### Notes

- Responder:
--- First, it will listen to multicast NR queries (LLMNR – UDP/5355, NBT-NS – UDP/137) and, under the right conditions, spoof a response – directing the victim to the machine on which it is running.
--- Once a victim will try and connect to our machine, Responder will exploit the connection to steal credentials and other data.
- MultiRelay relay the authentication packet ti a different machine to get privileged access to it.
* Responder:
- First, it will listen to multicast NR queries (LLMNR – UDP/5355, NBT-NS – UDP/137) and, under the right conditions, spoof a response – directing the victim to the machine on which it is running.
- Once a victim will try and connect to our machine, Responder will exploit the connection to steal credentials and other data.
* MultiRelay relay the authentication packet ti a different machine to get privileged access to it.

##### Refs
- https://www.triaxiomsecurity.com/2019/03/20/vulnerability-walkthrough-nbns-and-llmnr-spoofing/
Expand Down

0 comments on commit e2e90f8

Please sign in to comment.