Say a user mistypes a host name and DNS resolution fails, automatically sends an LLMNR request, and link-local servers of course will say that this mistyped host name is not known to them. An attacker with a rogue server (e.g. Responder: sudo responder -I tun0 -rdwv) can respond with yes and get the user’s machine to send his username & NetNTLM hash. With the hash, the attacker can either crack the hash or do SMB relay.

Mitigations

If LLMNR is not required:

  • disable LLMNR (“turn off multicast name resolution”)
  • disable NBT-NS (“Disable NetBIOS over TCP/IP”)

If LLMNR / NBT-NS is necessary on the network:

  • Require Network Access Control
  • Set a strong password policy (longer than 14 characters and no dictionary words)