πŸ”
OffSec Wiki
search
⌘Ctrlk
πŸ”
OffSec Wiki
  • Tools
  • Information Gathering
  • Exploitation
  • Cracking
  • Enumeration
  • API Sec
  • Web Pentesting
  • Linux
  • Wordpress
  • Post Exploitation
  • Persistence
  • Powershell
  • RED Teaming
  • Purple Teaming
  • Reverse Engineering
  • Pivoting
  • Metasploit
  • Networking
  • OSINT
  • Active Directory
    • AD PT Mindset
    • AD Lab creation
    • Physical AD Components
    • Logical AD Components
    • Exploits
    • LLMNR Poisoning - Responder
    • SMB Relay
    • Get SMB Shares
    • Gaining shell
    • IPv6 Attacks
    • Passback Attacks
    • Post-Compromise Enumeration
    • Bloodhound
    • Post Compromise Attacks
    • Token Impersonation
    • PowerUp
    • Group Policy Preferences (GPP)
    • URL file attacks
    • Print Nightmare
    • ADRecon
    • Mimikatz
    • Certifried & Bloodhound: Active Directory Certificate Services Abuse
    • Certificate Services: Domain Dominance
    • Kerberoasting
    • Kerberos: Golden Tickets
    • ZeroLogon
    • Pass-back
    • ldap enum
    • From Domain Admin to Enterprise Admin
    • Silver Ticketing
    • AS-REP Roasting
    • AD Attacks Automated Scripts
  • Cloud
  • Containers
  • WIFI
  • Buffer Overflow
  • Code Review
  • Routers
  • Automotive CyberSec
  • Threat Modeling
  • Hardware & Lock Bypassing
  • Scripting
  • General PT Methodology
  • Blockchain
  • Challenges
  • Flipper
  • CERTS
  • Notes
  • Hacking Kubernetes
  • CV
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Active Directory

LLMNR Poisoning - Responder

Link Local Multicast Name Resolution < > DNS

Responder config for SMB relay attack

https://ethicalhackingguru.com/the-complete-ntlm-relay-attack-tutorial/ethicalhackingguru.comchevron-right
LogoKSEC ARK - Pentesting and redteam knowledge base | Responder - Ultimate GuideKSEC ARK - Pentesting and redteam knowledge basechevron-right
LogoHow to use Responder to capture NetNTLM and grab a shell - A2SecureA2Securechevron-right
LogoLLMNR & NBT-NS Poisoning and Credential AccessCynet Unified, AI-Powered Security Platform for MSPs & SMEschevron-right
LogoPwning with Responder - A Pentester's GuideNotSoSecurechevron-right

arrow-up-right

PreviousExploitschevron-leftNextSMB Relaychevron-right

Last updated 2 years ago