technique
https://www.intelligence.senate.gov/sites/default/files/documents/os-kmandia-033017.pdf
Kevin Mandia. (2017, March 30). Prepared Statement of Kevin Mandia, CEO of FireEye, Inc. before the United States Senate Select Committee on Intelligence. Retrieved April 19, 2019.
technique
https://documents.trendmicro.com/assets/white_papers/wp-a-deep-dive-into-defacement.pdf
Marco Balduzzi, Ryan Flores, Lion Gu, Federico Maggi, Vincenzo Ciancaglini, Roel Reyes, Akira Urano. (n.d.). A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks. Retrieved April 19, 2019.
technique
https://attack.mitre.org/techniques/T1491/002
technique
https://github.com/Kevin-Robertson/Conveigh
Robertson, K. (2016, August 28). Conveigh. Retrieved November 17, 2017.
technique
https://github.com/nomex/nbnspoof
Nomex. (2014, February 7). NBNSpoof. Retrieved November 17, 2017.
technique
https://github.com/SpiderLabs/Responder
Gaffie, L. (2016, August 25). Responder. Retrieved November 17, 2017.
technique
https://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_response
Francois, R. (n.d.). LLMNR Spoofer. Retrieved November 17, 2017.
technique
https://blog.secureideas.com/2018/04/ever-run-a-relay-why-smb-relays-should-be-on-your-mind.html
Kuehn, E. (2018, April 11). Ever Run a Relay? Why SMB Relays Should Be On Your Mind. Retrieved February 7, 2019.
technique
https://www.sternsecurity.com/blog/local-network-attacks-llmnr-and-nbt-ns-poisoning
Sternstein, J. (2013, November). Local Network Attacks: LLMNR and NBT-NS Poisoning. Retrieved November 17, 2017.
technique
https://technet.microsoft.com/library/cc958811.aspx
Microsoft. (n.d.). NetBIOS Name Resolution. Retrieved November 17, 2017.