While conducting a network infrastructure review, a security analyst discovers a laptop that is plugged into a core switch and hidden behind a desk. The analyst sees the following on the laptop's screen:
[*] [NBT-NS] Poisoned answer sent to 192.169.23.115 for name FILE-SHARE-A (service: File Server)
[*] [LLMNR] Poisoned answer sent to 192.168.23.115 for name FILE-SHARE-A
[*] [LLMNR] Poisoned answer sent to 192.168.23.115 for name FILE-SHARE-A
[SMBv2] NTLMv2-SSP Client : 192.168.23.115
[SMBv2] NTLMv2-SSP Username : CORP\jsmith
[SMBv2] NTLMv2-SSP Hash : F5DBF769CFEA7...
[*] [NBT-NS] Poisoned answer sent to 192.169.23.24 for name FILE-SHARE-A (service: File Server)
[*] [LLMNR] Poisoned answer sent to 192.168.23.24 for name FILE-SHARE-A
[*] [LLMNR] Poisoned answer sent to 192.168.23.24 for name FILE-SHARE-A
[SMBv2] NTLMv2-SSP Client : 192.168.23.24
[SMBv2] NTLMv2-SSP Username : CORP\progers
[SMBv2] NTLMv2-SSP Hash : 6D093BE2FDD70A...
Which of the following is the BEST action for the security analyst to take?
nonjabusiness
Highly Voted 2 years, 5 months agodb97
2 years agoXoomalla
1 year, 7 months agoLaudy
Highly Voted 2 years, 6 months agoJimmyJams
Most Recent 1 year, 9 months agoDerekM
1 year, 10 months agoSimonR2
1 year, 11 months ago2Fish
2 years agoDrVoIP
2 years agoCL_QRT
2 years, 1 month agoSweety_Certified7
5 days, 1 hour agoStiobhan
2 years, 1 month agosho123
2 years, 3 months agoDcfc_Doc
2 years, 4 months agoKelz56
2 years, 4 months agoGoat54
2 years, 2 months agoamateurguy
2 years, 4 months agoIT_Master_Tech
2 years, 4 months agoTeyMe
2 years, 4 months agoTeyMe
2 years, 3 months agoAcidoNZ
2 years, 3 months agoA_core
2 years, 4 months agowico
2 years, 4 months ago