Book 5: Hijacking Attacks Flashcards
A way in which we can hijack system information?
LLMNR
what is Link-Local-Multicast Name Resolution?
NetBIOS and LLMNR are protocols used to resolve host names on local networks. Their main function is to resolve host names to facilitate communication between hosts on local networks
Any time there is a system or service blindy reaching out for help to identify a system or service, an attacker can hijack that response and redirect the victim system through a computer we control.
true
what is responder?
a tool that is designed to launch LLMNR attacks.
Automatically launches a number of services to redirect victim systems in order to harvest credentials
- HTTP, HTTPs, SQL Server, Kerberos, FTP, IMAP, SMTP, DNS, LDAP.
Responder launches not only LLMNR attacks but also can launch __, ___ attacks
NBTS-NS
DNS/MDNS
What tool automatically launches a number of services to redirect victim systems to harvest credentials?
responder
what is the goal of responder?
spoof a system, then be ready to intercept the authentication requests on the fly. In addition serve up malicious .exe files and force downgrade for LANMAN authentication (easier to crack)
Responder is a tool dedicated to answering stray LLMNR/MNT-NS/proxy requests
true
When a windows host cannot resolve a hostname using DNS, it uses the LLMNR protocol (Link-Local Multicast Name Resolution) to ask neighboring computers about it. If that also fails, then it uses the NBT-NS (NetBios Name Service).
When LLMNR/NBT-NS is used to resolve a name, any host on the network can reply. So, Responder is one of such tools that poisons the request.
true
Responder will not only harvest credentials, but can stand up a number of services, because the victim has to go to that server and do something. Whatever request the victim is making, the attacker needs to have that service running so the victim can authenticate in order to grab their credentials. in addition, servinig malicious files.
true.
Responder will not only harvest credentials, but can stand up a number of services, because the victim has to go to that server and do something. Whatever request the victim is making, the attacker needs to have that service running so the victim can authenticate in order to grab their credentials. in addition, serving malicious files.
true.
Responder will try and have a service that the victim can authenticate to in order to grab credentials?
true
responder can force the victim to downgraded its authentication to LANMAN?
true. because they are easier to crack
How to start responder?
sudo /opt/Responder/Responder.py -I eth0
When a user requests a service where hostname isnt answered. Responder will reply to the final resolution attempt(Multicast DNS) with the attacksers IP address, forcing the user to connect to attacker service, potentially disclosing password hash info
yes.