Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Najam Ul Saqib :verified:
Najam Ul Saqib :verified:
@cybersoldier@infosec.exchange  ·  activity timestamp 2 years ago

These days I am trying to learn AD pentest and many questions are popping up in my mind, so here's one for AD Attackers.
In LLMNR Poisoning, we're setting a server running responder that will listen to LLMNR queries and act as rogue SMB server, but how can we trick users to put some non-existent IP address or share name into their explorer? Are we just relying on a coincidence of a user mistakenly jotting down a typo?

#ActiveDirectory #Pentesting

  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-beta.35 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct