Poisoning Attacks

Understanding AD Poisoning Attacks

Core Concept

Purpose: Intercept and respond to Windows name resolution requests to capture domain NTLM authentication credentials.

Attack Flow:

AD Client β†’ Broadcast Request β†’ Attacker Response β†’ Client Authentication β†’ Domain Credential Capture
  • Domain-joined Windows client fails to resolve a name via DNS

  • Client broadcasts name resolution request using Windows protocols

  • Attacker responds claiming to be the requested service

  • Client authenticates to attacker using domain NTLM credentials

  • Attacker captures domain NTLMv2 hash for offline cracking

Requirements: Network access on same subnet, Windows name resolution protocols enabled

Attack Value: Domain credential harvesting without requiring initial system access


LLMNR & NBT-NS Poisoning

Purpose: Poison LLMNR or NetBIOS name resolution requests to capture Windows domain authentication credentials.

Requirements:

  • For LLMNR Poisoning

    • Windows clients with LLMNR enabled (default), multicast traffic allowed

  • For NBT-NS

    • NetBIOS over TCP/IP enabled, Windows systems in AD domain

LLMNR & NBT-NS Poisoning with Responder

Step 1:

Step 2:

Just wait for natural authentication event to occur or you can force the authentication.

For more information about forcing authentication, see Authentication Triggers and Forcing Techniques

circle-info

Place holder for a real example


DHCPv6 Poisoning for AD Environments

IPv6 DHCP Poisoning with AD DNS Takeover

Purpose: Use IPv6 DHCPv6 to become the DNS server for Windows AD clients and capture all authentication attempts.

Requirements: IPv6 enabled Windows AD clients, DHCPv6 client support

Attack Value: Complete DNS control over AD clients, bypasses SMB signing, captures all domain authentication

mitm6 - Advanced IPv6 Attack for AD

DHCPv6 + NTLM Relay for AD Compromise


WPAD Poisoning in AD Environments

Web Proxy Auto-Discovery for Domain Credentials

Purpose: Exploit automatic proxy configuration to intercept web traffic and capture domain user credentials.

Requirements: WPAD enabled in browsers, automatic proxy detection, domain users accessing web resources

Attack Value: Captures domain credentials when users authenticate to web applications through proxy

WPAD Attack with Responder for AD

Custom WPAD for AD Credential Harvesting


Integrated AD Poisoning Workflows

Comprehensive AD Credential Harvesting

Targeted AD Poisoning with Relay

High-Value AD Target Identification


Post-Capture AD Credential Processing

Domain Credential Extraction and Analysis

AD Environment Validation

Last updated

Was this helpful?