[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fwD08NerKew3UyGYROLrPRKNDw9n9ONlQQ3FiV4OyYBo":3},{"article":4,"iocs":42},{"id":5,"title":6,"slug":7,"summary":6,"ai_summary":8,"brief":9,"full_text":10,"url":11,"image_url":12,"published_at":13,"ingested_at":14,"relevance_score":15,"entities":16,"category_id":22,"category":23,"article_tags":26},"5e1d3ccc-e7bd-40aa-b9d0-d75181ac4ef1","When Responder forces a NetBIOS election and wins https:\u002F\u002Ft.co\u002Fwihk8U3OKM","when-responder-forces-a-netbios-election-and-wins-https-t-co-wihk8u3okm-8654c6","The article discusses how the Responder tool leverages NetBIOS election protocols to force a win in network elections, allowing attackers to intercept and potentially redirect network traffic. This technique demonstrates a vulnerability in how NetBIOS name resolution handles election mechanisms, which Responder exploits for credential harvesting and man-in-the-middle attacks.","Responder tool exploits NetBIOS election mechanism to intercept network traffic.",null,"https:\u002F\u002Fx.com\u002FSwiftOnSecurity\u002Fstatus\u002F2054211355914244170","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHIIGV08WcAAiyUF.jpg","2026-05-12T14:45:27+00:00","2026-05-12T15:00:18.517671+00:00",7,[17,20],{"name":18,"type":19},"NetBIOS","technology",{"name":21,"type":19},"LLMNR","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":22,"icon":10,"name":24,"slug":25},"Vulnerabilities","vulnerabilities",[27,32,37],{"category":28},{"id":29,"icon":10,"name":30,"slug":31},"02371804-cf6d-4449-98de-f1a2d4d9b266","Tools","tools",{"category":33},{"id":34,"icon":10,"name":35,"slug":36},"2c8f44d4-b56e-47cf-9677-04f22c9ee78d","Identity & Access","identity-access",{"category":38},{"id":39,"icon":10,"name":40,"slug":41},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[43],{"type":44,"value":45,"context":46},"malware","Responder","Network attack tool that exploits NetBIOS election to intercept traffic and harvest credentials"]