Skip to content

Latest commit

 

History

History
37 lines (20 loc) · 2.01 KB

README.md

File metadata and controls

37 lines (20 loc) · 2.01 KB

asker - LLMNR Honeypot

counterpart to Responder.py

This tool takes a list of known-bogus local hostnames, and sends out LLMNR requests for them every 5-25 legitimate LLMNR requests from other hosts.

This is intended for use by a blue team who wants to catch a red team or attacker using Responder, who either does not target-select carefully enough, or falls for the bogus hostnames which should be tailored to the environment (e.g. if there is a DC named "addc1", you might want to add "adddc1" to the list.

note: this tool requres scapy to be installed.

note2: if you receive errors about vboxnet not being a valid interface from ifconfig on 'import scapy.all', this is an issue with scapy that I cannot fix, and will affect any programs using scapy's 'route' module. To resolve, run "sudo ifconfig vboxnet(n) down" for any virtualbox network adapters. I've only seen this is OS X, but it should apply in Linux as well.

Running the script

(I know the bait names change; I put these together over a long period of testing and I'll fix it later...)

launch

Once the script starts, it will begin sniffing LLMNR packets on the local network. After enough requests are seen, it will construct and send its own.

bait_send

The packet will show up as an "ANY" type DNS query and be treated by Responder as any other LLMNR request:

responder

Once it responds to the request...

malicious_response

the response will be identified and alerted on:

malicious_response_detection

Ctrl-C interrupts the sniff() loop instance, sending out an LLMNR phish. To interrupt the program, use Ctrl-Z, then 'sudo killall python'.

If the email options are provided when run, an email will be sent(max once every 5 minutes) when an alert is tripped.

email_alert