
Description:
LLMNR poisoning is a network-based attack where an attacker sets up a rogue machine on the network to intercept name resolution requests. When a machine on the network attempts to access a file-sharing resource or hostname that is unavailable via DNS, it falls back on Link-Local Multicast Name Resolution (LLMNR) or NetBIOS Name Service (NBNS). The attacker’s rogue machine responds to these requests, tricking the victim into believing it has found the requested resource. In doing so, the rogue machine can capture the user's or administrator's credentials on the local network (LAN) in the form of NTLMv1 or NTLMv2 hashes. The attacker perform offline rainbow table attack or pass the hash attacks through getting access to target machine.

Impact:
1.Credentials theft:
An attacker can gain access to user credentials on the target network or machines. Therefore, even if the credentials are in hashed form, an attacker can still access the machine.
2.Privilege Escalation:
With captured credentials, attackers can escalate privileges within a network.
3.Lateral Movement:
Attackers can use stolen credentials to access other machines, applications, or network shares.

Preventation:
1.Disable LLMNR:
To disable LLMNR, select “Turn OFF Multicast Name Resolution” under Computer Configuration > Administrative Templates > Network > DNS Client in the Group Policy Editor of Active Directory.
Note: you disabled LLMNR only but crucial defence is disable MDNS,NBT-NS as well.
2.NBT-NS
To disable NBT-NS, navigate to Network Connections > Network Adapter Properties > TCP/IPv4 Properties > Advanced tab > WINS tab and select “Disable NetBIOS over TCP/IP” in Active Directory. This only works locally.
3.MDNS:

Note: Microsoft currently advises leaving this running as some
technologies utilise the protocol (Display adapters, chrome cast,
printer discover).
Impact on User Experience: Disabling mDNS could affect how some applications or devices work. Users may need to manually configure networked devices (like printers, smart displays, etc.) instead of having them automatically detected.Alternatives: If mDNS is only a concern in the context of LLMNR poisoning, consider using firewall rules or network-level filtering to block mDNS traffic on UDP port 5353 without disabling it on the entire system.- Open Windows Registry Editor
- Navigate to HKLM\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters
- create a DWORD "EnableMDNS" with the value “0”.

To avoid this kind of vulnerability security professionals would recommand the organisation perform peroridic vulnerability assessment and peneteration testing.
Created by:
Offensive security team
Shakta Technologies Pvt Ltd