While conducting a network infrastructure review, a security analyst discovers a laptop that is plugged into a core switch and hidden behind a desk. The analyst sees the following on the laptop's screen:
[*] [NBT-NS] Poisoned answer sent to 192.169.23.115 for name FILE-SHARE-A (service: File Server)
[*] [LLMNR] Poisoned answer sent to 192.168.23.115 for name FILE-SHARE-A
[*] [LLMNR] Poisoned answer sent to 192.168.23.115 for name FILE-SHARE-A
[SMBv2] NTLMv2-SSP Client : 192.168.23.115
[SMBv2] NTLMv2-SSP Username : CORP\jsmith
[SMBv2] NTLMv2-SSP Hash : F5DBF769CFEA7...
[*] [NBT-NS] Poisoned answer sent to 192.169.23.24 for name FILE-SHARE-A (service: File Server)
[*] [LLMNR] Poisoned answer sent to 192.168.23.24 for name FILE-SHARE-A
[*] [LLMNR] Poisoned answer sent to 192.168.23.24 for name FILE-SHARE-A
[SMBv2] NTLMv2-SSP Client : 192.168.23.24
[SMBv2] NTLMv2-SSP Username : CORP\progers
[SMBv2] NTLMv2-SSP Hash : 6D093BE2FDD70A...
Which of the following is the BEST action for the security analyst to take?
nonjabusiness
Highly Voted 2 years, 9 months agodb97
2 years, 4 months agoXoomalla
1 year, 10 months agoLaudy
Highly Voted 2 years, 10 months agoJimmyJams
Most Recent 2 years, 1 month agoDerekM
2 years, 1 month agoSimonR2
2 years, 2 months ago2Fish
2 years, 4 months agoDrVoIP
2 years, 4 months agoCL_QRT
2 years, 4 months agoSweety_Certified7
3 months, 4 weeks agoStiobhan
2 years, 5 months agosho123
2 years, 7 months agoDcfc_Doc
2 years, 8 months agoKelz56
2 years, 8 months agoGoat54
2 years, 5 months agoamateurguy
2 years, 8 months agoIT_Master_Tech
2 years, 8 months agoTeyMe
2 years, 8 months agoTeyMe
2 years, 7 months agoAcidoNZ
2 years, 7 months agoA_core
2 years, 8 months agowico
2 years, 8 months ago