Video
nbtscan-unixwiz Usage Examples
Scan a range of IP addresses (192.168.0.100-110
) without doing inverse name lookups (-n
):
root@kali:~# nbtscan-unixwiz -n 192.168.0.100-110192.168.0.105 WORKGROUP\RETROPIE SHARING*timeout (normal end of scan)
Scan a single IP address (192.168.0.38
) and show Full NBT resource record responses (-f
):
root@kali:~# nbtscan-unixwiz -f 192.168.0.38192.168.0.38 WORKGROUP\DOOKOSSEL SHARING DOOKOSSEL <00> UNIQUE Workstation Service DOOKOSSEL <03> UNIQUE Messenger Service<3> DOOKOSSEL <20> UNIQUE File Server Service ..__MSBROWSE__.<01> GROUP Master Browser WORKGROUP <00> GROUP Domain Name WORKGROUP <1d> UNIQUE Master Browser WORKGROUP <1e> GROUP Browser Service Elections 00:00:00:00:00:00 ETHER
nbtscan-unixwiz
This package contains a command-line tool that scans for open NETBIOSnameservers on a local or remote TCP/IP network, and this is a first step infinding of open shares. It is based on the functionality of the standardWindows tool nbtstat, but it operates on a range of addresses instead of justone.
Installed size: 49 KB
How to install: sudo apt install nbtscan-unixwiz
Dependencies:
- libc6
nbtscan-unixwiz
root@kali:~# nbtscan-unixwiz -hnbtscan-unixwiz: invalid option -- 'h'nbtscan 1.0.35 - 2008-04-08 - http://www.unixwiz.net/tools/usage: nbtscan-unixwiz [options] target [targets...] Targets are lists of IP addresses, DNS names, or address ranges. Ranges can be in /nbits notation ("192.168.12.0/24") or with a range in the last octet ("192.168.12.64-97") -V show Version information -f show Full NBT resource record responses (recommended) -H generate HTTP headers -v turn on more Verbose debugging -n No looking up inverse names of IP addresses responding -p <n> bind to UDP Port <n> (default=0) -m include MAC address in response (implied by '-f') -T <n> Timeout the no-responses in <n> seconds (default=2 secs) -w <n> Wait <n> msecs after each write (default=10 ms) -t <n> Try each address <n> tries (default=1) -P generate results in perl hashref format
Updated on: 2024-May-23