When investigating a compromise or malware infection activity, a security analyst should know how to identify the hosts on the network apart from IP to MAC address match. One of the best methods is identifying the hosts and users on the network to decide the investigation's starting point and list the hosts and users associated with the malicious traffic/activity. Protocols that can be used in Host and User identification:
DHCP protocol, or Dynamic Host Configuration Protocol (DHCP), is the technology responsible for managing automatic IP address and required communication parameters assignment.
dhcp or bootp dhcp.option.dhcp == 3 dhcp.option.dhcp == 5 dhcp.option.dhcp == 6dhcp.option.hostname contains "keyword"
dhcp.option.domain_name contains "keyword"
NetBIOS or Network Basic Input/Output System is the technology responsible for allowing applications on different hosts to communicate with each other.
nbns nbns.name contains "keyword"Kerberos is the default authentication service for Microsoft Windows domains. It is responsible for authenticating service requests between two or more computers over the untrusted network. The ultimate aim is to prove identity securely.
kerberos kerberos.CNameString contains "keyword" kerberos.CNameString and !(kerberos.CNameString contains "$" )kerberos.pvno == 5kerberos.realm contains ".org" kerberos.SNameString == "krbtg"nbns.flags.opcode == 5