Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Actively detect llmnr / wpad poisoning #405

Open
ION28 opened this issue Feb 28, 2021 · 0 comments
Open

Actively detect llmnr / wpad poisoning #405

ION28 opened this issue Feb 28, 2021 · 0 comments

Comments

@ION28
Copy link
Owner

ION28 commented Feb 28, 2021

"detect netbios/LLMNR poisoning by having your endpoint agent issue a request for a non-existent resource. Tools like Responder would respond to this request, giving themselves away. I can say from experience that this is great for pinpointing attacker machines. False positives are rare, typically associated with misconfigured routers.

...the Insight agents are instructed to issue queries for non-existent host names over NBT-NS (as the most vulnerable systems would) and any received responses will expose the spoofer

https://blog.rapid7.com/2016/10/19/analytics-by-any-other-name-new-insightidr-detections-released/
https://github.com/Kevin-Robertson/Conveigh"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant