Another Security Blog

A place to show my mad skills

TidBits Walkthroughs Resources Projects View on GitHub
26 May 2025

TB Noxious

by C. Casquatch

LLMNR Poisoning Walkthrough

Scenario Overview

The IDS device alerted us to a possible rogue device on the internal Active Directory network. It also flagged unusual LLMNR traffic directed towards Forela-WKstn002 (IP: 172.17.79.136). As a Network Forensics expert, you are asked to investigate potential LLMNR poisoning on the Active Directory VLAN.


What is LLMNR Poisoning?

TCM Security’s article provides an excellent explanation:


Step-by-Step Analysis

Step 1: Identify Most Active IPs

Open Statistics -> Endpoints in Wireshark to view the top talkers. Look for IPs close to 172.17.79.136 to understand the internal IP layout.

Screenshot 1


Step 2: Find the Malicious IP Address

Screenshot 2


Step 3: Identify Hostname of the Rogue Device

Screenshot 3


Step 4: Confirm Hash Capture & Find the Username

Screenshot 4 Screenshot 5 Screenshot 6


Step 5: Find the First Time the Hash Was Captured

Screenshot 7


Step 6: Identify the Victim’s Typo

Hint: Domain Controller Controller? Oops.


Step 7: Extract NTLM Server Challenge Value

Screenshot 8


Step 8: Find the NTProofStr Value

Screenshot 9 Screenshot 10


Step 9: Crack the Captured Hash

Note: Don’t forget the colon after NTProofStr – it’ll save you 30 minutes of frustration.

Screenshot 11 Screenshot 12


Step 10: Identify the Target File Share

Screenshot 13


tags: ntlm - LLMNR - htb - noxious - wireshark