LLMNR Poisoning

Поділитися
Вставка
  • Опубліковано 9 лис 2024

КОМЕНТАРІ • 8

  • @offensivehacker2622
    @offensivehacker2622 2 роки тому +1

    Really good explanation bro, please cover more attacks in Active Directory Pentesting

  • @vadlamudijurendra2647
    @vadlamudijurendra2647 2 роки тому

    Bro can you make a video on how to break/get password from wpa handshake without using a wordlist.

    • @SathvikTechtuber
      @SathvikTechtuber  2 роки тому +1

      Through the help of evil twin attack!
      I've already made a video on that do check that out

  • @sotecluxan4221
    @sotecluxan4221 2 роки тому

    😜

  • @CyberCelt.
    @CyberCelt. 2 роки тому

    Great video thank you. Weirdly when I try it I get lots of "[*] [NBT-NS] Poisoned answer sent to" and the same for LLMNR but no hashes returned

    • @SathvikTechtuber
      @SathvikTechtuber  2 роки тому +1

      Yeah it happens

    • @CyberCelt.
      @CyberCelt. Рік тому +1

      @@SathvikTechtuber I needed to turn on smb v1 on the client for it to work. Just so you know 😊