- Metasploit Bootcamp
- Nipun Jaswal
- 118字
- 2021-07-09 21:00:07
Scanning NetBIOS services with Metasploit
Netbios services also provide vital information about the target and help us uncover the target architecture, operating system version, and many other things. To scan a network for NetBIOS services, we can use the nbname module from auxiliary/scanner/netbios, as shown in the following screenshot:

As we did previously, we set the RHOSTS to the entire network by providing the CIDR identifier. Let's run the module and analyze the results as follows:

We can see that we have almost every system running the NetBIOS service on the network listed in the preceding screenshot. This information provides us with useful evidence for the operating system type, name, domain, and related IP addresses of the systems.
推薦閱讀
- 網絡空間攻防技術原理
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 工業(yè)控制網絡安全技術
- Kali Linux Wireless Penetration Testing Cookbook
- 網絡安全能力成熟度模型:原理與實踐
- 軟件安全保障體系架構
- 數(shù)據(jù)安全領域指南
- 華為防火墻實戰(zhàn)指南
- 從實踐中學習密碼安全與防護
- INSTANT Apple Configurator How-to
- Mastering Malware Analysis
- 企業(yè)數(shù)據(jù)安全防護指南
- 交換機·路由器·防火墻(第2版)
- INSTANT Kali Linux
- Android Application Security Essentials