LLMNR Poisoning – Part III: Joining Windows 10 to Domain, Mapping Shared Folder, & Quick Kali Configuration

Part I: Part I: Requirements / Installing Operating Systems
Part II: Part II: Setting up Active Directory
Part III: Part III: Joining Windows 10 to Domain, Mapping Shared Folder, & Quick Kali Configuration
Part IV: Part IV: Attacking

Now that we’ve created a domain, a domain user, and a share, we’re going to map that shared folder to the Windows 10 machine, and then ensure our Kali machine has the proper programs and dependencies installed to execute the attack.

Joining Windows 10 to the domain:

First off, I didn’t want to keep the generic computer name that Windows came up with, so I changed that.

Now that’s out of the way, we’re going to need the IP Address from the Windows Server 2016 machine. You can get this by running Command Prompt and typing in the command, ipconfig.

Now that you have your Windows Server 2016 IP Address, we’re going to use that on the Windows 10 computer so that they can communicate with each other. Go back on your Windows 10 machine now.

The computer will now restart, and once it’s booted back up, you’ll be presented with the login screen to login to the domain under the domain user you created.

Great! Now let’s map that shared folder.

Mapping Shared Folder:

Once you’re logged in, open file explorer, click on This PC on the left hand side, Computer on the top menu bar, and then Map network drive.

That’s it. Now we will configure Kali to ensure it will properly perform LLMNR poisoning.

Configuring Kali:

Login to your Kali machine with the credentials you created. Open a terminal, and then folllow the images below to purge any instance of impacket, and then reinstall it.

Now you should be all set up for configuring your Kali machine and have Windows 10 setup. Next post, we’re getting to the good stuff.

Related Post

Leave a Reply

Your email address will not be published. Required fields are marked *