Listen for LLMNR broadcasts.
Respond with malicious answers.
Capture NTLMv2 hashes when victims authenticate.
No credentials needed—just network access.
Active Directory Name Resolution Attack
Requires: Network access • Difficulty: Low • Impact: High
💻 Desktop Experience Available
View this module on desktop for an interactive LLMNR Poisoning simulation with hash capture visualization.
LLMNR Poisoning (Link-Local Multicast Name Resolution) is an Active Directory attack that exploits Windows' fallback name resolution protocol. When DNS fails, Windows broadcasts LLMNR queries on the local network. Attackers respond with malicious answers, causing victims to authenticate to attacker-controlled shares and leaking NTLMv2 password hashes.
\\fileserver in Windows ExplorerLLMNR has no authentication. Any host on the network can respond to LLMNR queries. Attackers listen for LLMNR broadcasts, respond claiming to be the requested host, and capture NTLMv2 authentication hashes when victims attempt to connect.
Why It's Effective: LLMNR is enabled by default on all Windows systems (Vista+). Users frequently mistype share names or access resources not in DNS. Every failed DNS lookup triggers an LLMNR broadcast—creating countless attack opportunities.
LLMNR Poisoning techniques should only be used in authorized penetration testing, red team engagements, or controlled lab environments. Unauthorized access to computer systems is illegal under CFAA and equivalent laws worldwide. Always obtain written permission before testing.
Broadcast Listening & NTLMv2 Hash Capture