Nmap: nbstat
Jump to navigation
Jump to search
Sumber: https://nmap.org/nsedoc/scripts/nbstat.html
File nbstat
Script types: hostrule Categories: default, discovery, safe Download: http://nmap.org/svn/scripts/nbstat.nse
User Summary
Attempts to retrieve the target's NetBIOS names and MAC address.
By default, the script displays the name of the computer and the logged-in user; if the verbosity is turned up, it displays all names the system thinks it owns.
Example Usage
sudo nmap -sU --script nbstat.nse -p137 <host>
Script Output
Host script results: |_ nbstat: NetBIOS name: WINDOWS2003, NetBIOS user: <unknown>, NetBIOS MAC: 00:0c:29:c6:da:f5 (VMware) Host script results: | nbstat: NetBIOS name: WINDOWS2003, NetBIOS user: <unknown>, NetBIOS MAC: 00:0c:29:c6:da:f5 (VMware) | Names: | WINDOWS2003<00> Flags: <unique><active> | WINDOWS2003<20> Flags: <unique><active> | SKULLSECURITY<00> Flags: <group><active> | SKULLSECURITY<1e> Flags: <group><active> | SKULLSECURITY<1d> Flags: <unique><active> |_ \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
Contoh lain
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2016-02-14 20:25 WIB Nmap scan report for 192.168.0.80 Host is up (0.0018s latency). PORT STATE SERVICE 137/udp open netbios-ns MAC Address: 36:66:33:66:32:39 (Unknown) Host script results: |_nbstat: NetBIOS name: WIKI, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown) Nmap done: 1 IP address (1 host up) scanned in 14.44 seconds