While conducting a network infrastructure review, a security analyst discovers a laptop that is plugged into a core switch and hidden behind a desk. The analyst sees the following on the laptop's screen:
[*] [NBT-NS] Poisoned answer sent to 192.169.23.115 for name FILE-SHARE-A (service: File Server)
[*] [LLMNR] Poisoned answer sent to 192.168.23.115 for name FILE-SHARE-A
[*] [LLMNR] Poisoned answer sent to 192.168.23.115 for name FILE-SHARE-A
[SMBv2] NTLMv2-SSP Client : 192.168.23.115
[SMBv2] NTLMv2-SSP Username : CORP\jsmith
[SMBv2] NTLMv2-SSP Hash : F5DBF769CFEA7...
[*] [NBT-NS] Poisoned answer sent to 192.169.23.24 for name FILE-SHARE-A (service: File Server)
[*] [LLMNR] Poisoned answer sent to 192.168.23.24 for name FILE-SHARE-A
[*] [LLMNR] Poisoned answer sent to 192.168.23.24 for name FILE-SHARE-A
[SMBv2] NTLMv2-SSP Client : 192.168.23.24
[SMBv2] NTLMv2-SSP Username : CORP\progers
[SMBv2] NTLMv2-SSP Hash : 6D093BE2FDD70A...
Which of the following is the BEST action for the security analyst to take?
nonjabusiness
Highly Voted 2 years, 7 months agodb97
2 years, 2 months agoXoomalla
1 year, 9 months agoLaudy
Highly Voted 2 years, 8 months agoJimmyJams
Most Recent 1 year, 11 months agoDerekM
1 year, 12 months agoSimonR2
2 years ago2Fish
2 years, 2 months agoDrVoIP
2 years, 2 months agoCL_QRT
2 years, 3 months agoSweety_Certified7
2 months agoStiobhan
2 years, 3 months agosho123
2 years, 5 months agoDcfc_Doc
2 years, 6 months agoKelz56
2 years, 6 months agoGoat54
2 years, 3 months agoamateurguy
2 years, 6 months agoIT_Master_Tech
2 years, 6 months agoTeyMe
2 years, 6 months agoTeyMe
2 years, 5 months agoAcidoNZ
2 years, 5 months agoA_core
2 years, 6 months agowico
2 years, 6 months ago