tag:blogger.com,1999:blog-13777170.post2349469095540229062..comments2024-03-11T02:35:50.848-05:00Comments on grand stream dreams: Without fail…Unknownnoreply@blogger.comBlogger3125tag:blogger.com,1999:blog-13777170.post-74329223358421371462011-11-07T02:34:09.630-06:002011-11-07T02:34:09.630-06:00Claus, personally I use this version of nbtscan, w...Claus, personally I use this version of nbtscan, which does not have cgywin dependency:<br /><br />http://www.unixwiz.net/tools/nbtscan.htmlMark Woanhttp://www.woanware.co.uknoreply@blogger.comtag:blogger.com,1999:blog-13777170.post-35430258503667988002011-11-07T01:04:49.618-06:002011-11-07T01:04:49.618-06:00a lot of attackers have also found NBTScan
Don...<i>a lot of attackers have also found NBTScan</i><br /><br />Don't have public-facing NetBIOS shares; they should only be accessible via LAN or VPN. If you've got an attacker on the LAN/VPN, you've got bigger problems than NetBIOS shares.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-13777170.post-77328578884731968732011-11-06T19:30:17.211-06:002011-11-06T19:30:17.211-06:00Great find, Claus! Unfortunately a lot of attacke...Great find, Claus! Unfortunately a lot of attackers have also found NBTScan. I've seen evidence of it being used during several intrusion investigations. Unfortunately almost anything that can be used for good, can also be used for evil....Chad Tilburyhttp://forensicmethods.comnoreply@blogger.com