Legacy Windows protocols continue to expose organizations to credential theft, according to a new cybersecurity study by Resecurity.
The research found that attackers can capture login data simply by being on the same local network as their targets, without exploiting software vulnerabilities.
Link-Local Multicast Name Resolution (LLMNR) and its predecessor, NetBIOS Name Service (NBT-NS), are designed to help Windows systems find other devices when DNS lookups fail.
However, these protocols trust any device that responds to their requests, allowing attackers to impersonate legitimate systems.
Attackers can use tools such as Responder to intercept these broadcasts and trick a victim machine into sending authentication data.
Author's summary: Legacy Windows protocols expose networks to credential theft.