Avatar billede myllesen Nybegynder
07. januar 2002 - 10:12 Der er 17 kommentarer og
1 løsning

NetBIOS session attack

Jeg har TDC bredbånd med ZoneAlarm sw firewall. Den registrerer nu at en anden host via ADSL-linien forsøger en NetBIOS session. Men hvordan gør han i praksis det? (altså opretter en session mod mig). Jeg troede kun NetBIOS blev brug på LAN.
Avatar billede dr.m Nybegynder
07. januar 2002 - 10:15 #1
you can do start > run > \\\\ipnumber

if netbios ports are open, you will be asked to give a user name and password
Avatar billede myllesen Nybegynder
07. januar 2002 - 10:23 #2
Are NetBIOS ports open by default? (OS==Windows98)

The username/password, is that for the Windows login or is it some specific NetBIOS login credentials?
Avatar billede victor44 Nybegynder
07. januar 2002 - 10:29 #3
Hvis den alarm du modtager er et \'angreb\' mod port 137 udp er det med stor sandsynlighed en af de utallige dårligt konfigurerede MS servere der er på internettet.
Når man laver en session til en sådan maskine tror den starks at du er med i dens netværk og forsøger at få kontakt til dig via netbios.
Hvis det afvises så ignorer det.
Hvis du ikke vil ignorere det så forbered dig på en lang kamp med uvidende folk der ikke aner at deres server sender disse data ud og påstår at der ikke er noget galt fordi de har det nyeste antivirus program installeret.

Man kan slå det fra ved at slå netbios over TCP/IP fra på serveren.

LuF
Avatar billede dr.m Nybegynder
07. januar 2002 - 10:34 #4
port are open by default yes.
ADSL routers have build in filters though to block these ports.

Another ways of blocking it is by firewalling (even a simple one like zone alarm) or TCP filtering on the net card (mostly used by web servers)

the credentials will be asked for the local PC or domain. it is still a good idea to block these ports since most hacking is made by password guessing techniques.

make sure that your guest account is disabled if you are using win2k or XP
Avatar billede myllesen Nybegynder
07. januar 2002 - 10:45 #5
-> dr.m
Does this really mean that a host not protected by a CPE router/firewall is wide open for remote browsing (and thus hacking) via the ADSL line using NetBIOS? I didn\'t think it was that easy to hack!

Anyway, what I imagined was that since TDC Bredbånd is bridged Ethernet, then some other host in the same access domain (that is, towards the same DSLAM) would be able to use some LAN protocol like NetBIOS/NetBEUI to attack me. But that\'s not the case, or?

->victor44
Jeg har slået NetBIOS fra. Og jeg kører ikke som server.
Avatar billede victor44 Nybegynder
07. januar 2002 - 10:58 #6
Det er ligegyldigt om du kører som server.
Det er alle de servere som du besøger på internettet som ikke har slået det fra der er problemet.

LuF
Avatar billede dr.m Nybegynder
07. januar 2002 - 11:02 #7
yes. Guessing password however is not always easy.
If the password is easy then using a dictionary to guess many passwords per second (programs do that) will bring results fast, brute force will take much longer depending on the password complicity and CPU power. If you want to thing like a hacker, then you will be smarter, I once sew a company that mapped drives on a remote network through netbios over a 45 mb internet connection, all is password protected all are happy. it took me 10 minutes to crack it and I didn\'t use password guessing... I just realized that since they map drives, then all I needed and hoped for was that the actual mapping bat file was not ACLed properly. I was right. the user name and password was there in clear text. Fortunately I was consulting for them so we got it under control.

the point is, YES! if you are not protected by router access-lists, port filtering, firewall or anything to block these ports (and other important ones) then you are at potential risk.

I am not sure into how ISP\'s act to protect end users, but I never relay on it. that is also why it is important to use NTFS on your OS and follow many other DO\'s and DON\'T DO\'s on Microsoft platform and networking generally.

on NT systems (meaning NT 4.0, win2k and XP) you have a feature called auditing where you can monitor many things such as failed or successes privilege use.

Firewalls often has that as well and you can then use free tools like \"syslog\" to read the log file and alert you.
I do not consider Zone alarm and black ice as proper firewalls but it\'s OK for personal PC\'s.

if you are in doubt on rather your ISP has some sort of filtering process along the long routing way, give them a call and ask to talk with anybody else then a sales man :-)

/Michael
Avatar billede myllesen Nybegynder
07. januar 2002 - 12:39 #8
->dr.m
Great answer. The true expertism shines thru!
Maybe you can clear up a related question. I have reported to the \"abuse-guy\" (abuse@isp....) some heavy scans on my ADSL line. But is it really illegal to scan ports, or when is the line crossed towards a real crime?

->victor44
Ok, jeg misforstod. Det jeg kan se er at jeg bliver angrebet af en host i samme subnet som mig selv. Så derfor er det nok ikke en server som jeg har opsøgt.

Avatar billede victor44 Nybegynder
07. januar 2002 - 13:27 #9
Næ, men MS maskiner vil gerne finde andre netbios maskiner i deres eget subnet ;-)

LuF
Avatar billede myllesen Nybegynder
07. januar 2002 - 14:02 #10
Men det kræver vel at de specifikt bruger min IP adresse for at starte en NetBIOS session? Kører MS så bare hele subnettet igennem og prøver alle addresser?
Avatar billede dr.m Nybegynder
07. januar 2002 - 15:49 #11
:-) Thanks.

I am not 100% sure about the Danish law, but I am almost sure that it is illegal to port scan.
One can innocently say \"but why? If you try to open a door and it is closed, is that a burglary attempt?\" but then again with scanning it more like trying different keys so yes. In many countries it is considered as hacking attempt and it is punishable.

About IP\'s... when you get on the Internet, you receive a \"real\" IP, on ADSL it is most often static and on modems it is most often dynamic. Hackers can try to use that IP.
If you are in a network where, then you often have 1 single IP on the router or firewall and then all PC\'s use NAT to go on the Internet. That is a good technology for 3 main reasons.

1. Cost effective. A company does not need to by so many IP address.

2. Decrease the size of the net. The Internet was not designed to have so many hosts. It has simply flourished beyond what they have expected it to be. With NAT you don\'t use that many IP\'s (next generation of IP addressing is already developed so we can have unlimited IP\'s... almost)

3. Security. Which is relevant here. A hacker will need to have a lot more knowledge in order to pass NAT. he will need to hack the device (gateway, router, firewall) first, then know your internal IP and hack your machine...

Anyway, you don\'t need to be on the same sub mask to connect with netbios to another network! That’s why we have routers. Not all protocols can be routed but that is a whole different story...

/Michael
Avatar billede dr.m Nybegynder
07. januar 2002 - 15:51 #12
by so many = buy so many
Avatar billede myllesen Nybegynder
07. januar 2002 - 20:04 #13
OK doc,
So I tried to fight back against this NetBIOS attack fella. But when I run \\\\<his-IP> I just get \"The network name cannot be found\". Well, in fact when I enter my own IP address there I get the same response (but that may be for some other reason?). Furthermore, I don\'t get anything besides \"Unable to browse the nework\" when clicking the network neighborhood icon.

Is he using special protocol for his attack? (My OS is W98).
Avatar billede dr.m Nybegynder
07. januar 2002 - 20:23 #14
Sounds like you have more then just TCP/IP installed but I could be wrong.

He is only using TCP/IP
OS doesn\'t matter here except for the higher risk due to win9x architecture, which is not designed for security!
Could I get his IP? I could probably tell you something from it.

...Another possibility is that your firewall software reports falsely, never say never.

It is a good idea to remove unused protocols. All you need for the Internet is TCP/IP. Other protocols are sometimes used for games although you can use TCP/IP for games as well.

Usually simple basic firewalling allows all outgoing traffic but restricts incoming traffic based on different rules like port number. (Different rules according to firewall capability and how high it is on the OSI model. but again, different story)
This might explain why he can try to connect to you but you cannot connect to him using this port.

to feel better about your personal security, see this: https://grc.com/x/ne.dll?bh0bkyd2
Avatar billede myllesen Nybegynder
07. januar 2002 - 20:31 #15
Tonight\'s attacking IP: 80.62.242.110

To get it right: When I enter the \\\\IP I try to make a NetBIOS session over TCP/IP, right? And for some reason it just doesn\'t work for me.
Avatar billede dr.m Nybegynder
09. januar 2002 - 13:48 #16
sorry, all I could find in my quick search was the abuse email address which I am sure you already have.

it is not just for some reason that you can\'t do it. it might be that the other side is blocking that port, it might be that you have more then TCP/IP installed and your binding order is not using TCP/IP first.

if you are trying a remote IP, then it might be that your ISP is not allowing that method. your attacker then must have a different ISP.
there are many possibilities as you can see.

try running \\\\127.0.0.1 that is your loop address

the good news is that since you are alerted of that activity, you are most likely protected.

the reason I like NT technology so much is for security reasons. you can have different kind of permissions defined on the folder or file level.

If a hacker gains access through poor networking, he will still need the right credentials to access important files.

Avatar billede myllesen Nybegynder
11. januar 2002 - 10:00 #17
->dr.m
Tried a dedicated scanning tool for NetBIOS, and it worked. I\'m quite surprised how easy it is to access files on other hosts. I wonder why the ISPs don\'t inform better about such threats...
The points are your\'s.
Avatar billede dr.m Nybegynder
11. januar 2002 - 10:25 #18
I agree.
thanks for the points
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester