Academy

Module 2 Β· Layer 2/3 Trust β€” ARP, DNS, LLMNR Poisoning πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
5 min read

The protocols that make networks work β€” ARP, DHCP, DNS, LLMNR, NBT-NS, mDNS β€” were all designed with zero authentication. They worked in the original LAN era because the LAN was a single trusted segment. In 2026, these protocols are still deployed at scale, still unauthenticated, and attackers still farm them for credentials daily. This module covers why Layer 2/3 protocols remain catastrophic trust points.

Why this happens

ARP (1982), DHCP (1993), DNS (1987), LLMNR (2007) β€” the dates tell the story. Designed before network-scale threat models existed. Designed when “the network” meant “the cable in the office.” Signed/authenticated versions exist (DNSSEC, DHCPv6 with authentication, 802.1X) but deployment is uneven. Microsoft Active Directory still uses LLMNR and NBT-NS by default on domain-joined workstations in 2026 despite Microsoft’s own published guidance recommending disabling them.

The attacker’s position: on the local segment (after phishing or Wi-Fi compromise), inject responses to these unauthenticated protocols. Victim workstations accept the injected responses as truth. Credentials, session info, and lateral movement opportunities follow.

The classic: LLMNR / NBT-NS poisoning

When a Windows workstation tries to resolve a hostname not in DNS, it asks LLMNR (port 5355) and NBT-NS (137) on the local subnet via broadcast. “Hey, does anyone know where PRINTER-3RD-FLOOR is?” Any attacker on the subnet can respond: “Yes, that’s me.” Victim then authenticates to the attacker, sending their NTLM hash.

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 29% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
7 more sections locked below