Please create an account to participate in the Slashdot moderation system


Forgot your password?

Submission NetBIOS Design Allows Traffic Redirection-> 1

iago-vL writes: Security researchers at SkullSecurity released research demonstrating how the NetBIOS protocol allows trivial hijacking due to its design; they have demonstrated this attack in a tool called 'nbpoison' (in the package 'nbtool'). If a DNS lookup fails on Windows, the operating system will broadcast a NetBIOS lookup request that anybody can respond to. One vector of attack is against business workstations on an untrusted network, like a hotel; all DNS requests for internal resources can be redirected (Exchange, proxy, WPAD, etc). Other attack vectors are discussed here. Although similar attacks exist against DHCP, ARP, and many other LAN-based protocols, and we all know that untrusted systems on a LAN means game over, NetBIOS poisoning is much quieter and less likely to break other things.
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

NetBIOS Design Allows Traffic Redirection

Comments Filter:

You are in the hall of the mountain king.