In this chapter, you have learned the workings of the NTLM and LLMR protocols and their inherent weaknesses. You have learned how to poison network traffic to capture user credentials.
You have also learned how to use many tools, such as Responder and Etthercap, in unison to exploit your target system. And finally, we learned how to spoof an update service, such as Windows Update, and exploit the system using this service.