HOST IDENTIFICATION
During an investigation, analysts must determine which hosts were compromised. In addition to matching IP addresses to MAC addresses and correlating them with the asset inventory (if available), analysts can use the following protocols to identify infected hosts:
Dynamic Host Configuration Protocol (DHCP) traffic
NetBIOS (NBNS) traffic
Kerberos traffic
These protocols can provide valuable information for host and user identification during the investigation.
Last updated