by C. Casquatch
LLMNR Poisoning Walkthrough
The IDS device alerted us to a possible rogue device on the internal Active Directory network. It also flagged unusual LLMNR traffic directed towards Forela-WKstn002 (IP: 172.17.79.136). As a Network Forensics expert, you are asked to investigate potential LLMNR poisoning on the Active Directory VLAN.
TCM Security’s article provides an excellent explanation:
Open Statistics -> Endpoints in Wireshark to view the top talkers. Look for IPs close to 172.17.79.136 to understand the internal IP layout.

udp.port == 5355172.17.79.136. Only one IP responds – this is our suspected rogue machine.
ip.addr == 172.17.79.135 && dhcp
smb2 to locate SMB traffic.ntlmssp.NTLMSSP_AUTH packets – you’ll find the username here.

NTLMSSP_AUTH packet.
DC01 as DCC01.Hint: Domain Controller Controller? Oops.
ntlmssp filter again.NTLMSSP_CHALLENGE packet.SMB2 -> Session Setup Response -> Security Blob -> NTLM Server Challenge
NTLMSSP_AUTH packet just after the challenge.NTProofStr.

Construct your hash in the following format:
Username::Domain:ServerChallenge:NTProofStr:NTLMv2Response (without first 16 bytes)
Save to a file and use:
hashcat -a 0 -m 5600 /path/to/file/hashfile.txt /path/to/file/rockyou.txt
Note: Don’t forget the colon after NTProofStr – it’ll save you 30 minutes of frustration.

smb2 filter.