🖊️ Author: Nairuz Abulhul
🌐 Blog: R3dbuck3t
Below are some of the key data points that we should be looking for
Capturing Traffic - Identifying Hosts
LLMNR/NBT-NS Poisoning -Identify Users
Enumerating Protocols - Identify Users
Password Attacks - Hunt for Domain Creds
Identifying Potential Vulnerabilities