Page cover

PoisonedCredentials Lab

Network Forensics Lab

1-First of All to detect the Miss-typed Query I added The Ip in filter to and also Saw The Protocol We All our Work is for LLMNR Protocol so here is the query

2-After the Respond of the Query we Easily seen that the Ip Source Of The Query is Defiantly The Ip of the Attacker

3- And As same as the Previous Question The Query respond From the Second rogue Ip

4- To Identify the UserName I use Network Miner and Simply in the Credentials Tab here it`s

5-To Determine the Hostname I started to look up in the packet For User Cybercactus.local and This hostname i get it from Network miner so when i found it directly follow the tcp stram and here we go

Last updated