{
	"id": "3dfe4864-84b1-442d-b952-c2ff3dfa2bf1",
	"created_at": "2026-04-06T00:16:30.485067Z",
	"updated_at": "2026-04-10T13:11:47.892209Z",
	"deleted_at": null,
	"sha1_hash": "6b167e1119c9d5c21392fba5dc24c445fdd34716",
	"title": "Rapid7",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 38261,
	"plain_text": "Rapid7\r\nBy Rapid7\r\nArchived: 2026-04-05 20:57:22 UTC\r\nmodule\r\nLLMNR Spoofer\r\nDisclosed Created\r\nN/A May 30, 2018\r\nDisclosed\r\nN/A\r\nCreated\r\nMay 30, 2018\r\nDescription\r\nLLMNR (Link-local Multicast Name Resolution) is the successor of NetBIOS (Windows Vista and up) and is\r\nused to\r\nresolve the names of neighboring computers. This module forges LLMNR responses by listening for LLMNR\r\nrequests\r\nsent to the LLMNR multicast address (224.0.0.252) and responding with a user-defined spoofed IP address.\r\nAuthor\r\nRobin Francois rof@navixia.com\r\nModule Options\r\nTo display the available options, load the module within the Metasploit console and run the commands 'show\r\noptions' or 'show advanced':\r\n msf \u003e use auxiliary/spoof/llmnr/llmnr_response\r\n msf auxiliary(llmnr_response) \u003e show actions\r\n ...actions...\r\nhttps://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_response\r\nPage 1 of 2\n\nmsf auxiliary(llmnr_response) \u003e set ACTION \u003c action-name \u003e\r\n msf auxiliary(llmnr_response) \u003e show options\r\n ...show and set options...\r\n msf auxiliary(llmnr_response) \u003e run\r\nNEW\r\nExplore Exposure Command\r\nConfidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.\r\nSource: https://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_response\r\nhttps://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_response\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_response"
	],
	"report_names": [
		"llmnr_response"
	],
	"threat_actors": [],
	"ts_created_at": 1775434590,
	"ts_updated_at": 1775826707,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6b167e1119c9d5c21392fba5dc24c445fdd34716.pdf",
		"text": "https://archive.orkl.eu/6b167e1119c9d5c21392fba5dc24c445fdd34716.txt",
		"img": "https://archive.orkl.eu/6b167e1119c9d5c21392fba5dc24c445fdd34716.jpg"
	}
}