← Back 26 May 2025

TB Noxious

by C. Casquatch

LLMNR Poisoning Walkthrough

Scenario Overview

The IDS device alerted us to a possible rogue device on the internal Active Directory network. It also flagged unusual LLMNR traffic directed towards Forela-WKstn002 (IP: 172.17.79.136). As a Network Forensics expert, you are asked to investigate potential LLMNR poisoning on the Active Directory VLAN.


What is LLMNR Poisoning?

TCM Security’s article provides an excellent explanation:


Step-by-Step Analysis

Step 1: Identify Most Active IPs

Open Statistics -> Endpoints in Wireshark to view the top talkers. Look for IPs close to 172.17.79.136 to understand the internal IP layout.

Screenshot 1


Step 2: Find the Malicious IP Address

Screenshot 2


Step 3: Identify Hostname of the Rogue Device

Screenshot 3


Step 4: Confirm Hash Capture & Find the Username

Screenshot 4 Screenshot 5 Screenshot 6


Step 5: Find the First Time the Hash Was Captured

Screenshot 7


Step 6: Identify the Victim’s Typo

Hint: Domain Controller Controller? Oops.


Step 7: Extract NTLM Server Challenge Value

Screenshot 8


Step 8: Find the NTProofStr Value

Screenshot 9 Screenshot 10


Step 9: Crack the Captured Hash

Note: Don’t forget the colon after NTProofStr – it’ll save you 30 minutes of frustration.

Screenshot 11 Screenshot 12


Step 10: Identify the Target File Share

Screenshot 13


tags: ntlm - LLMNR - htb - noxious - wireshark