In this blog, we explore the vulnerabilities associated with LLMNR (Link-Local Multicast Name Resolution) and WPAD (Web Proxy Auto-Discovery Protocol) poisoning attacks. We delve into practical scenarios demonstrating how attackers can exploit these protocols to intercept sensitive information, capture NTLMv2 hashes, and manipulate network traffic.