LLMNR (Link-Local Multicast Name Resolution) and NBT-NS (NetBIOS Name Service) are fallback name-resolution protocols used by Windows when DNS fails. Poisoning those requests means an attacker answers the broadcasted name lookup, impersonates the requested host, and causes the victim to attempt authentication—leaking NTLM/Negotiate authentication data (challenge/response) that can be captured for cracking or relaying.

image.png

MITRE ATT&CK ID: T1557.001


1- Quick facts


2- How the attack flows

  1. User tries \\\\DCC01\\share (typo or DNS failure).
  2. Windows issues LLMNR/NBT-NS query: “Who is DCC01?” (broadcast).
  3. Attacker replies: “I am DCC01 — here’s my IP.”
  4. Victim connects to attacker and performs Windows authentication (SMB/HTTP/LDAP).
  5. Attacker captures NTLM challenge/response packets (NTProofStr + blob).
  6. Attacker either:

3- What you see in network captures (Wireshark / PCAP)