-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label netbios. Show all posts
Showing posts with label netbios. Show all posts
  • All About NetBIOS Enumeration

     


     

    NetBIOS  Enumeration



    NetBIOS stands for network basic input output system. IBM developed it along with sytek. The primary intention of NetBIOS was developed as application programming interfae (API) to enable access to LAN resources by the client's software.


    NetBIOS naming convention start with 16-ASCII character string used to identify the network devices over TCP/IP. 15 characters are used for the device name and the 16 characters is reserved for the service or name record type.




    NetBIOS enumeration explained



    NetBIOS software runs on PORT 139 on windows operating system file and printer service needs to be enabled to enumerate NetBIOS over windows operating system.

    An attacker can perform the below on the remote machine.


    1) Choose to read or write to a remote machine depending on the availability of shares.
    2) Launch a Denial of Service (DOS) attack on the remote machine.
    3) Enumerate password policies on the remote machine.



    NetBIOS Enumeration Tools


    The following tables shows the list of toolls to perform NetBIOS Enumeration.

    Name of the tools and web links.

    1) Nbstat - www.technet.microsoft.com

    2) Superscan - https://www.mcafe.com/in/downloads/free-tools/superscan.aspx

    3) Hyena - http://www.systemtools.com/hyena

    4) winfingerprint - http://packetstormsercurity.com/files/38356/winfingerprint-0.6.2.zip.html





    NetBIOS security controls 



    The following are the security controls to prevent NetBIOS enumeration attacks.

    # Minimize the attack surface by minimizing the unnecessary service like server message block (SMB).


    # Remove file and printer sharing in windows OS.




    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     
  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.