References

Type
Url
Description

technique

https://www.intelligence.senate.gov/sites/default/files/documents/os-kmandia-033017.pdf

Kevin Mandia. (2017, March 30). Prepared Statement of Kevin Mandia, CEO of FireEye, Inc. before the United States Senate Select Committee on Intelligence. Retrieved April 19, 2019.


technique

https://documents.trendmicro.com/assets/white_papers/wp-a-deep-dive-into-defacement.pdf

Marco Balduzzi, Ryan Flores, Lion Gu, Federico Maggi, Vincenzo Ciancaglini, Roel Reyes, Akira Urano. (n.d.). A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks. Retrieved April 19, 2019.


technique

https://attack.mitre.org/techniques/T1491/002


technique

https://github.com/Kevin-Robertson/Conveigh

Robertson, K. (2016, August 28). Conveigh. Retrieved November 17, 2017.


technique

https://github.com/nomex/nbnspoof

Nomex. (2014, February 7). NBNSpoof. Retrieved November 17, 2017.


technique

https://github.com/SpiderLabs/Responder

Gaffie, L. (2016, August 25). Responder. Retrieved November 17, 2017.


technique

https://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_response

Francois, R. (n.d.). LLMNR Spoofer. Retrieved November 17, 2017.


technique

https://blog.secureideas.com/2018/04/ever-run-a-relay-why-smb-relays-should-be-on-your-mind.html

Kuehn, E. (2018, April 11). Ever Run a Relay? Why SMB Relays Should Be On Your Mind. Retrieved February 7, 2019.


technique

https://www.sternsecurity.com/blog/local-network-attacks-llmnr-and-nbt-ns-poisoning

Sternstein, J. (2013, November). Local Network Attacks: LLMNR and NBT-NS Poisoning. Retrieved November 17, 2017.


technique

https://technet.microsoft.com/library/cc958811.aspx

Microsoft. (n.d.). NetBIOS Name Resolution. Retrieved November 17, 2017.