Before you have any credentials, the network itself can hand them to you. LLMNR and NBT-NS are legacy name resolution protocols built into Windows that broadcast queries to the local network segment — and any host can respond. This module explains why these protocols are dangerous, how to capture NTLMv2 hashes with Responder, how to relay those credentials directly to services, and how to crack captured hashes offline.
Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two name resolution protocols that Windows uses when DNS fails. When a user types a hostname that DNS cannot resolve (e.g. a typo in a UNC path), Windows falls back to LLMNR (multicast on the local subnet) and then to NBT-NS (broadcast).
The critical flaw: any machine on the network can respond to these queries — Windows has no way to verify who is answering. A malicious host can respond to every LLMNR/NBT-NS query it hears, claiming to be the requested resource. When the victim's machine connects to the attacker's host expecting authentication, it sends its NTLMv2 credentials automatically.
Why this matters: the NTLMv2 hash is crackable offline with Hashcat. If the user's password is in a wordlist, you recover plaintext credentials. Even if cracking fails, you can relay the NTLMv2 response directly to another host for authentication (SMB relay — next section).
Responder is a Swiss army knife for LLMNR/NBT-NS/MDNS poisoning. It poisons name resolution queries and captures the resulting NTLM authentication attempts. It also includes rogue servers for HTTP, FTP, LDAP, and others to capture credentials from those protocols.
When a victim machine on the same subnet sends a broadcast name resolution query, Responder responds and captures the authentication attempt. The hash appears in the terminal and is saved to /usr/share/responder/logs/:
NTLMv2 hashes are not plaintext — they are challenge/response pairs. To recover the password, you run Hashcat against them offline with a wordlist. Hashcat's mode for NTLMv2 is 5600.
hashcat -m 5600 hash.txt wordlist.txt -r OneRuleToRuleThemAll.rule. Rule-based attacks apply mutations (leet substitution, capitalisation, appended numbers) to every word in the list — dramatically increasing coverage.If cracking the NTLMv2 hash is taking too long (long password, no wordlist match), or if you want to go faster, SMB relay lets you use the captured authentication directly — forwarding it to another host in real time to authenticate as the victim without ever knowing their password.
Prerequisites for SMB relay to work:
Use CME to identify targets without SMB signing:
Run the relay with Impacket's ntlmrelayx: