By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system.
Sub-technique of
T1557
See: MITRE ATT&CK
By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system.
Sub-technique of
T1557
See: MITRE ATT&CK