---
工具名稱: nbtscan-unixwiz
所屬分類: Information Gathering
標簽: [nbtscan-unixwiz,information gathering,netbios,kali linux,recon,enumeration]
創建時間: 2017-04-24 13:34:00
---
0x00 介紹
-------
一個在本地或遠程TCP/IP網絡上掃描開放的NETBIOS名稱服務器的命令行工具。它基于Windows系統的nbtstat工具的功能實現,但它可在許多地址上運行,而不是僅一個地址。
<!--more-->
[主頁][1] | [倉庫][2]
- 作者:Steve Friedl
- 證書:public-domain
0x01 功能
-------
NBTSCAN-unixwiz - 開放NETBIOS名稱服務器掃描器
```
root@kali:~# nbtscan-unixwiz
nbtscan 1.0.35 - 2008-04-08 - http://www.unixwiz.net/tools/
用法: nbtscan-unixwiz [選項] 目標 [目標...]
目標可以是IP地址,DNS名稱或地址的列表范圍。
范圍可以表示成“192.168.12.0/24”或“192.168.12.64-97”
-V 顯示版本信息
-f 顯示完整的NBT資源記錄響應(推薦)
-H 生成HTTP請求頭
-v 開啟詳細輸出調試
-n 不查找響應IP地址的反向名稱
-p <n> 綁定UDP端口(默認0)
-m 響應中包含MAC地址 (等同'-f')
-T <n> 超時不響應 (默認2秒)
-w <n> 次寫入后等待秒數 (默認10ms)
-t <n> 每個地址嘗試次數(默認1次)
-P 以perl的hashref格式生成結果
```
0x02 示例
-------
掃描一系列IP地址(192.168.0.100-110),而不進行反向名稱查找(-n):
```
root@kali:~# nbtscan-unixwiz -n 192.168.0.100-110
192.168.0.105 WORKGROUP\RETROPIE SHARING
*timeout (normal end of scan)
```
掃描單個IP地址(192.168.0.38)并顯示完整的NBT資源記錄響應(-f):
```
root@kali:~# nbtscan-unixwiz -f 192.168.0.38
192.168.0.38 WORKGROUP\DOOKOSSEL SHARING
DOOKOSSEL <00> UNIQUE Workstation Service
DOOKOSSEL <03> UNIQUE Messenger Service<3>
DOOKOSSEL <20> UNIQUE File Server Service
..__MSBROWSE__.<01> GROUP Master Browser
WORKGROUP <00> GROUP Domain Name
WORKGROUP <1d> UNIQUE Master Browser
WORKGROUP <1e> GROUP Browser Service Elections
00:00:00:00:00:00 ETHER
```
視頻演示:[https://asciinema.org/a/104243][3]
[1]: http://unixwiz.net/tools/nbtscan.html
[2]: http://git.kali.org/gitweb/?p=packages/nbtscan-unixwiz.git;a=tree;h=refs/heads/kali/master;hb=refs/heads/kali/master
[3]: https://asciinema.org/a/104243
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool