BONUS: Hijacking Attacks with LLMNR using Responder – Cyber Security Discussion

The Daily Decrypt
The Daily Decrypt
BONUS: Hijacking Attacks with LLMNR using Responder – Cyber Security Discussion
Loading
/

**Episode Summary:**

In this episode, we explore key aspects of cybersecurity, starting with insights from the GCI course at SANS. The discussion includes:

– **Pen Testing and Responder Tools**: An overview of penetration testing methods and how responder tools are used in cyber attacks.

– **LLMNR Protocol and Vulnerabilities**: Examining the Link-Local Multicast Name Resolution protocol, focusing on its security weaknesses and how attackers exploit them.

– **Defense Strategies**: Strategies for cybersecurity defense, covering network configuration, strong password policies, and the use of honeypots for intrusion detection.

Tune in for a comprehensive look into both attacking and defending in the cybersecurity landscape.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397

https://attack.mitre.org/techniques/T1557/001/

https://nvd.nist.gov/vuln/detail/CVE-2020-12772

https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_rundll32_webdav_client_susp_execution.yml

https://tryhackme.com/room/outlookntlmleak

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.