Exploiting Windows Network with Responder and MultiRelay

preview_player
Показать описание

In a local network, Windows systems use Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (Net-NS) for host resolution when DNS and local hosts file lookups fail. So when a user mistypes the host name, or if a service is looking for a host which no longer exists, the queries are broadcasted to all systems in the same subnet. These protocol does not require any authentication, and any system in the local network can respond the client queries. Attackers use this very techniques to exploit systems in the local network. This is also very effective in the wireless networks which makes it a dangerous attack vector!

Рекомендации по теме
Комментарии
Автор

Iam an Ethical hacker i really learned enough from your tutorials. Thanks a million

osugovernorshipmovement
Автор

Suuuuch a good job man, keep doing these really demonstrative videos, they are the best kind.

uyscuti
Автор

#Rajganesh could you also post about how to setup the lab that's used here.

cyberagent
Автор

You have the name resolution order wrong.

SimZoneStudios
Автор

Hello, i have an issue: Hashes get passed to MultiRelay but it says "Relay failed, Logon Failure. This user doesn't have an account on this target.", which is kind of wierd. thanks

boustaniaymane
Автор

thx, but i have a situation where i start responder with wpad proxy on, get the NTLM challange 2, target makes a GET request for the wpad.dat file, but then nothing happens.. can you help?

lassebg
Автор

I am not getting any ntlm hashes in responder tool. Can anyone please help me

AbhisekMishra
Автор

is this done in the local area network

unixware
Автор

bro hope you are fine and there but you know what the link is not working

abelimathiasi
Автор

Awesome video, learned a lot from it and it was very easy to understand. I appreciate that you took the time to explain how we communicate with each network because it was something I had been struggling with for a while, and other videos I've seen don't take the time to explain it. First time seeing your videos but I'll definitely drop a follow!

mariacaldartdeu
Автор

Please tell me your RAM amount please. Guess 16 gb?

utkarshagrawal
Автор

what happens if there is no user in fornt of that attacking pc and we don't get any requests from the user account ? will the responder still receive any hash by the system services ?

gkooti
Автор

i have this problem when i run responder in eth0
[!] Error starting SSL server on port 443, check permissions or other servers running.
[+] Listening for events...
what can i do ??

maxrepyo
Автор

might be a dumb question or not, but does this work with linux networks? i get to capture hashes but when i use multirelay it does not give me a shell.

benjamincardona
welcome to shbcf.ru