-> A general idea of how LLMNR is leveraged for an attack:

Basic Steps:
- Run Responder -
sudo responder -I tun0 -dwP- responder responds to traffic
- A good time to run is - early in moring or after lunch, basically after a break when people are logging in into their computers and are GENERATING A LOT OF TRAFFIC
- Do not run vuln scans (eg nessus) at the same time
- An event occurs…

- Get Hashes on responder (NTLMv2 mostly)
- Crack the hash using something like hashcat
How I went about it
nmap
Mitigation
- Best defense - disable LLMNR and NBT-NS (older LLMNR). To disable…
- LLMNR: select “Turn OFF Multicast Name Resolution” under Local Computer Policy > Computer Configuration > Administrative Templates > Network > DNS Client in the Group Policy Editor.
- NBT-NS: navigate to Network Connections > Network Adapter Properties > TCP/IPv4 Properties > Advanced tab > WINS tab and select “Disable NetBIOS over TCP/IP”.
- If LLMNR/NBT-NS is required and/or cannot be disabled
- Require Network Access Control.
- Require strong user passwords (e.g., >14 characters and limit common word usage). The more complex and long the password, the harder it is for an attacker to crack the hash.