Legacy Windows Protocols Still Expose Networks to Credential Theft

Legacy Windows Protocols Still Expose Networks to Credential Theft

Legacy Windows protocols continue to expose organizations to credential theft, according to a new cybersecurity study by Resecurity.

The research found that attackers can capture login data simply by being on the same local network as their targets, without exploiting software vulnerabilities.

Vulnerable Protocols

Link-Local Multicast Name Resolution (LLMNR) and its predecessor, NetBIOS Name Service (NBT-NS), are designed to help Windows systems find other devices when DNS lookups fail.

However, these protocols trust any device that responds to their requests, allowing attackers to impersonate legitimate systems.

Attackers can use tools such as Responder to intercept these broadcasts and trick a victim machine into sending authentication data.

Author's summary: Legacy Windows protocols expose networks to credential theft.

more

Infosecurity Magazine Infosecurity Magazine — 2025-10-14

More News