Network Name Resolution Protocols and Mitigating MITM Attacks

Introduction to Network Name Resolution Protocols

Network name resolution protocols play a crucial role in enabling devices to locate each other on a network. By translating human-readable domain names into IP addresses, they facilitate communication and resource sharing. In this article, we will delve into the inner workings of NetBIOS, mDNS, LLMNR, and DNS, and provide you with real-world case studies and expert knowledge to better understand these protocols.

Case Study 1: NetBIOS

NetBIOS (Network Basic Input/Output System) is an older protocol that enables communication and resource sharing among devices on a local network. While it has largely been replaced by newer protocols, it is still found in some legacy systems.

Wireshark tip: To filter NetBIOS traffic, use the display filter nbns.

Case Study 2: mDNS

mDNS (Multicast Domain Name System) is a protocol that resolves hostnames to IP addresses within small networks without requiring a dedicated DNS server. It uses multicast queries to discover available services on the network.

Wireshark tip: To capture mDNS traffic, use the display filter mdns.

Case Study 3: LLMNR

LLMNR (Link-Local Multicast Name Resolution) is a protocol designed for name resolution on small networks without a DNS server. It operates similarly to mDNS, but uses different multicast addresses and is primarily found in Windows environments.

Wireshark tip: To capture LLMNR traffic, use the display filter llmnr.

Case Study 4: DNS

DNS (Domain Name System) is a hierarchical and distributed system that translates domain names into IP addresses, making it easier for users to access resources on the internet. It uses a series of queries and responses to resolve domain names.

Wireshark tip: To filter DNS traffic, use the display filter dns.

Identifying and Mitigating Man-in-the-Middle (MITM) Attacks

Man-in-the-middle (MITM) attacks involve an attacker intercepting and potentially altering communications between two parties. These attacks can be especially dangerous in the context of name resolution protocols, as they may allow attackers to redirect users to malicious websites or eavesdrop on sensitive information.

To identify potential MITM attacks using Wireshark, look for anomalies in traffic patterns or unexpected responses from name resolution protocols. For example, detecting duplicate responses to a DNS query could indicate an attacker attempting to intercept and modify traffic.

To mitigate MITM attacks, consider implementing security measures such as DNSSEC (Domain Name System Security Extensions), which adds cryptographic signatures to DNS data, ensuring its integrity and authenticity. Additionally, keeping software and network infrastructure up-to-date can help reduce the risk of vulnerabilities that may be exploited by attackers.

Join our training course, WIRED for Packet Analysis (, and explore our new online PCAP analyzer, PacketSafari (, to gain even more insights into network protocols and security.