Video není dostupné.
Omlouváme se.

Detecting Responder via LLMNR Honey Tasks on User Workstations

Sdílet
Vložit
  • čas přidán 18. 08. 2024
  • 00:00 - Intro
    00:15 - Talking about how the attack works and why NetBIOS/LLMNR should be disabled
    01:30 - Running Responder on a linux host and then attempting to browse a file share on a Windows Host and grabbing the Hash
    02:45 - Cracking the hashes our computer provided to show how easy it is to steal passwords on a network
    04:30 - Showing how we can perform an LLMNR request in PowerShell
    06:15 - Combining the Powershell LLMNR Request with our Slack WebMessage hook to send notifications to slack
    07:50 - Testing the powershell code out and seeing it send a message to Slack
    09:00 - Creating Scheduled Task to run this powershell code every 5 minutes
    11:00 - Converting the powershell to powershell friendly (UTF-16LE) Base64
    12:30 - Changing our scheduled task to write to EventLogs instead of Slack, which is better networks that have Centralized Logging
    18:15 - Showing the schedueld task runs every 5 minutes.

Komentáře • 31

  • @FelixLarz
    @FelixLarz Před rokem +24

    3:52 "This is what alot of junior pentesters would do"
    I felt that on a personal level ;-;

  • @armandkruger911
    @armandkruger911 Před rokem +3

    Love the cyber deception approach! It is missing in today's cyber industry

  • @majiri98
    @majiri98 Před rokem +4

    Thank you ippsec!

  • @emilsrbrden2987
    @emilsrbrden2987 Před rokem

    Great content my man, always love these videos that aren't just htb boxes. Keep it up!

  • @devops5259
    @devops5259 Před rokem +1

    Quote of the video "Memory of a gold fish".

  • @AHMmarques
    @AHMmarques Před rokem +1

    Excellent!!!

  • @muhammadmoizuddinrafay1447

    Very nice

  • @WasiLi0x1e
    @WasiLi0x1e Před rokem

    I like your style very much

  • @Saint2483
    @Saint2483 Před rokem

    Superb!!

  • @Andrew-tt2cx
    @Andrew-tt2cx Před rokem +4

    I made a python script and docker image a couple of months back that does something very similar and can write out to a remote syslog server when it detects responder running. It's all open source if anyone is interested, there is a video demo on my youtube.

  • @techjohnny
    @techjohnny Před rokem

    Was able to copy and paste the Curl command from the WebHooks example page without any syntax errors. Did this from Android Kali Nethunter. So many tid bits of learning! Will start encoding PowerShell commands. Using quotes without encoding is so problematic. Use GPOs to block LLMNR.

  • @orpheus0108
    @orpheus0108 Před rokem +1

    Awesome idea! Do you think you'd need to just place this task on different hosts for each VLAN you want to monitor? Some networks can get really segmented with many broadcast domains. LLMNR GPO will prevent the honeypot requests so you'd have to use a non domain joined computer for each vlan?
    Also, What do you generally do about mdns requests. Netbios and llmnr are easy to disable domain wide but as far as I know, the only way to prevent mdns poisoning is to implement inbound host based firewall rules. Is there a specific approach you take when defending against mDNS poisoning?

  • @MD4564
    @MD4564 Před rokem +1

    nice..... I noticed how that the Responded already detected dc03 it probably because of the cached (that you entered previously?).

  • @scwyldspirit
    @scwyldspirit Před rokem +1

    So going back to some of your prior retired CTF boxes on hackthebox. Trying to work through them at times python has to be used but since python3 is now the default, could you go through a video of how to convert a python 2 script to python3?

  • @monKeman495
    @monKeman495 Před rokem +2

    he is the definition of a cyber guru
    i wish i found him earlier thx @ippsec for solid security approach

  • @jvgassel
    @jvgassel Před rokem +1

    If Responder is for junior pentesters, what do senior pentesters use?

    • @ippsec
      @ippsec  Před rokem +2

      Typically I would expect senior Pentesters to not throw their Hail Mary’s right away and poison every request they see. Setup things in capture only, while they test for other specific things and pick their targets carefully.

  • @WasiLi0x1e
    @WasiLi0x1e Před rokem

    Hello, do you have a video about cracking hashes?

  • @amritaryal5897
    @amritaryal5897 Před rokem

    Hello ippsex, thanks alot fpr what u doin for the community.
    Can you build active directory playlist??! From your old videos too, for sake of noob like mehaha.thanks

  • @JD-kz8hh
    @JD-kz8hh Před rokem

    Resolve-DnsName -LlmnrOnly doesn't work if LLMNR is blocked via GPO (checked in Wireshark).
    Great idea though, maybe through a scheduled task we could flip the registry key temporarily until the GPO reapplies the LLMNR block.

    • @ippsec
      @ippsec  Před rokem +1

      Could also just put a non-domain joined machine on the network to do it. Or use Respounder from a raspberry pi or something.

  • @jugalshah5784
    @jugalshah5784 Před rokem

    To bypass this detection, can the attacker first just sniff the network for such script running (pattern of every few minutes asking to resolve same hostname) and block that ip with ufw?

    • @ippsec
      @ippsec  Před rokem

      What if it’s every workstation doing it and with random dns names? You’d have to configure responder to only respond to specific things and not any Llmnr request it see’s

  • @maxmusterspace6037
    @maxmusterspace6037 Před rokem

    I would have to whitelist this task, as I have detections on tasks containing powershell with "nop, enc and b64 starting with JAB" ;)

  • @JuanBotes
    @JuanBotes Před rokem

    \o/

  • @aas2906
    @aas2906 Před rokem

    Brother IppSec, it would be great if you could add a way to read each piece in text! It can help people like me who don't speak English very well to learn and understand. I wish you luck in life.

  • @pelic9608
    @pelic9608 Před rokem

    You are running Windows as Administrator there, right?
    I mean, an unpriviledged explorer window doesn't just send the Administrator's hash out to the network - does it?! 😳

    • @ippsec
      @ippsec  Před rokem +1

      It sends the hash of the logged in user. I was running as administrator

  • @JNx0
    @JNx0 Před rokem +2

    IppSec = "I have a memory of a gold fish"
    ME = 🥲🙃