Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Description

Adversaries may attempt to position themselves between two or more networked devices using an adversary - in -the - middle(AiTM) technique to support follow - on behaviors such as Network Sniffing or Transmitted Data Manipulation.By abusing features of common networking protocols that can determine the flow of network traffic(e.g.ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable.ioAdvanced Network ScanWindows machinesAuthenicated ScanSMBInteractive loginsPlugin ID: 161502
Tenable.ioAdvanced Network ScanWindows machinesAuthenicated ScanSMBLLMNR StatusPlugin ID: 160301
Tenable.adPassword SyncActive DirectoryPrivileged AD UserRPC (135 + high ports)User PasswordPlugin ID: C-PASSWORD-HASHES-ANALYSIS

References

Microsoft Windows SMB Sessions

Windows Create token object

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Credential Access, Collection

Platform: Windows

Products Required: Tenable.io and Tenable.ad

Tenable Release Date: 2022 Q2