Beyond LLMNR/NBNS Spoofing – Exploiting Active Directory-Integrated DNS
Common Information
Type Value
UUID f9a14cf1-d34c-439e-a385-7dbf74427b57
Fingerprint d43c2903886b86d1
Analysis status DONE
Considered CTI value 0
Text language
Published July 10, 2018, 7 a.m.
Added to db Jan. 18, 2023, 8:37 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Beyond LLMNR/NBNS Spoofing – Exploiting Active Directory-Integrated DNS
Title Beyond LLMNR/NBNS Spoofing – Exploiting Active Directory-Integrated DNS
Detected Hints/Tags/Attributes 49/1/17
Source URLs
Attributes
Details Type #Events CTI Value
Details Domain 1
nodnsrecord.inveigh.net
Details Domain 1
nodnsrecord2.inveigh.net
Details Domain 1
inveigh-dc1.inveigh.net
Details Domain 1
inveigh.net
Details Domain 1
hostmaster.inveigh.net
Details Domain 4128
github.com
Details Github username 5
kevin-robertson
Details md5 1
CBD38F1537AAD7D39CE6A5BC5687373A
Details IPv4 1
192.168.125.100
Details IPv4 1
192.168.125.102
Details IPv4 1
192.168.125.104
Details IPv4 1
192.168.125.105
Details IPv4 1
192.168.125.106
Details IPv4 1
192.168.125.10
Details IPv4 619
0.0.0.0
Details Url 4
https://github.com/kevin-robertson/powermad
Details Url 1
https://github.com/kevin-robertson/powermad/wiki