Here's an example of how an attacker could use Responder to carry out a credential theft attack:
is a protocol used in Windows networks to resolve hostnames to IP addresses in a local network
LLMNR poisoning is a type of cyberattack that involves intercepting and altering LLMNR network traffic to redirect network requests to a malicious server
→ where the attacker intercepts the network traffic between two devices and alters it to their advantage. Let's say you're at work and you try to connect to a network printer. Your computer sends an LLMNR broadcast asking for the IP address of the printer. An attacker intercepts this request and sends a response pretending to be the printer. Your computer then sends all print jobs to the attacker's server, allowing the attacker to view or manipulate the data being printed.
How it’s done by Responder Tool , But first .. What is Responder ?
Responder is a tool to intercept or carryout LLMNR poisoning attacks The tool works by sending specially crafted LLMNR and NBT-NS (NetBIOS Name Service) packets to the victim's computer, tricking it into sending its authentication credentials to the attacker's machine.