NetBIOS Hacking
This is for an Educational purpose only
All viewers please keep in mind one thing that all this information her is given for informational purpose so please dnt misuse of your knowledge
NetBIOS Attack MethodsThis NetBIOS attack technique was verified on Windows 95, NT 4.0 Workstation, NT 4.0 Server, NT 5.0 beta 1 Workstation, NT 5.0 beta 1 Server, Windows 98 beta 2.1. One of the components being used is NAT.EXEA discussion of the tool, it switches, and common techniques follows:
NAT.EXE [-o filename] [-u userlist] [-p passlist]
Switches:
-o Specify the output file. All results from the scan
will be written to the specified file, in addition
to standard output.
-u Specify the file to read usernames from. Usernames
will be read from the specified file when attempt-
ing to guess the password on the remote server.
Usernames should appear one per line in the specified file.
-p Specify the file to read passwords from. Passwords
will be read from the specified file when attempting to guess the password on the remote server.
Passwords should appear one per line in the specified file.
Addresses should be specified in comma deliminated
format, with no spaces. Valid address specifications include:
hostname - "hostname" is added
127.0.0.1-127.0.0.3, adds addresses 127.0.0.1
through 127.0.0.3
127.0.0.1-3, adds addresses 127.0.0.1 through
127.0.0.3
MaxQuadro5