Networking

NetBIOS Hacking

gettyimages-540824157-57fcb2435f9b586c35f86076
Written by techmanish

This is for an Educational purpose only

 

All viewers please keep in mind one thing that all this information her is given for informational purpose so please dnt misuse of your knowledge

NetBIOS Attack MethodsThis NetBIOS attack technique was verified on Windows 95, NT 4.0 Workstation, NT 4.0 Server, NT 5.0 beta 1 Workstation, NT 5.0 beta 1 Server, Windows 98 beta 2.1. One of the components being used is NAT.EXEA discussion of the tool, it switches, and common techniques follows:

NAT.EXE [-o filename] [-u userlist] [-p passlist]

 

Switches:

 

-o Specify the output file. All results from the scan

will be written to the specified file, in addition

to standard output.

-u Specify the file to read usernames from. Usernames

will be read from the specified file when attempt-

ing to guess the password on the remote server.

Usernames should appear one per line in the specified file.

-p Specify the file to read passwords from. Passwords

will be read from the specified file when attempting to guess the password on the remote server.

Passwords should appear one per line in the specified file.

 

Addresses should be specified in comma deliminated

format, with no spaces. Valid address specifications include:

hostname – “hostname” is added

127.0.0.1-127.0.0.3, adds addresses 127.0.0.1

through 127.0.0.3

127.0.0.1-3, adds addresses 127.0.0.1 through

127.0.0.3

About the author

techmanish

Leave a Reply

%d bloggers like this: