By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system.

Tactics
TA0006 TA0009

Sub-technique of
T1557


See: MITRE ATT&CK