Capture NTLM Hashes using LLMNR/NBT-NS Poisoning - Responder (2024)

preview_player
Показать описание
Capture NTLM Hashes using LLMNR/NBT-NS Poisoning using Responder, So, In this video, we'll dive into the fascinating world of network security and demonstrate how to capture NTLM hashes using LLMNR/NBT-NS poisoning with the powerful tool, Responder.

#LLMNR/NBT-NS #llmnr poisoning #ethical hacking #penetration testing

📌 What You’ll Learn:

What are LLMNR (Link-Local Multicast Name Resolution) and NBT-NS (NetBIOS Name Service)?
How attackers exploit these protocols to capture NTLM (NT LAN Manager) hashes.
Step-by-step guide on setting up and using Responder for LLMNR/NBT-NS poisoning.

💻 Tools Used:

Responder: A tool used for LLMNR, NBT-NS, and MDNS poisoning.
🔍 Why This Matters:
LLMNR/NBT-NS poisoning attacks can be used by attackers to capture sensitive NTLM hashes, which can be further exploited to gain unauthorized access to network resources. Understanding this attack vector is crucial for implementing effective network security measures.

📅 Subscribe & Stay Updated:
Don't forget to hit the subscribe button and ring the bell to get notified about our latest hacking tutorials.

Follow me on:
Twitter
Рекомендации по теме
Комментарии
Автор

can we use responder remotely from outside of the network

hiddengo