10 More Discussions You Might Find Interesting
1. Cybersecurity
Hello,
on a PC with Debian 8 I try to use a Bash script with Netfilter rules so that only traffic goes in and out that is wanted. For that I set all 3 default policies to "drop". The machine uses DHCP to get its IP, gateway and DNS. And I never checked so I was quite surprised that my... (1 Reply)
Discussion started by: SInt
1 Replies
2. AIX
Hello all,
planning to secure AIX sever by disabling insecure protocols/cipher suites; got the below requirements from secuirty team.
1.configure the server to disable support for DES and IDEA cipher suites
2.disable insecure TLS/SSL protocol support
Configure the server to... (4 Replies)
Discussion started by: Kumar7997
4 Replies
3. IP Networking
hello forum members,
What are L2 and L3 Protocols and can u brief me a bit little ie to gain a
basic knowledge.
Thanks & Regards
Rajkumar g (1 Reply)
Discussion started by: rajkumar_g
1 Replies
4. Linux
HI,
Is the Netfilter and IPtables same?
Thanks & Regards
Arun (1 Reply)
Discussion started by: Arun.Kakarla
1 Replies
5. IP Networking
OK Guys I need help.
I'm interest in P2p , can you recommend some books or sites about it
thx in advance (0 Replies)
Discussion started by: aobai
0 Replies
6. UNIX for Dummies Questions & Answers
I need suggestions for what to use.
I need all my users to be able to share files and be able to search into all their files.
I also need to control how much bandwidth they use so my network doesn't overload.
I can't have my users searching/downloading directly from each other which is my... (5 Replies)
Discussion started by: GoranX
5 Replies
7. IP Networking
what method would I use to determine which IP protocols network (0 Replies)
Discussion started by: mar mar
0 Replies
8. Programming
Hi everybody,
I have to write a module for matching in netfilter , extending the netfilter but I'm facing some problems can somebody guide me in that. I know that I need to write matching module working in kernel space and a program in userspace. I went through the HOWTO on netfilter-hacking but... (0 Replies)
Discussion started by: Trusted Penguin
0 Replies
9. UNIX for Dummies Questions & Answers
What protocol would be the best to use on a network with nt and unix servers and windows me clients?
Can SMB protocol be used to implement large networks?
What protocol can be used to make remote file systems appear as if they are local?
Quite a few questions I know, any help would be... (1 Reply)
Discussion started by: jnash
1 Replies
10. UNIX for Dummies Questions & Answers
Which network protocol is used by UNIX systems to make remote file systems appear as if they are local? (2 Replies)
Discussion started by: OLLERTON
2 Replies
NAT(1) General Commands Manual NAT(1)
NAME
smb-nat - NetBIOS Auditing Tool
SYNOPSIS
smb-nat [-o <output>] [-u <userlist>] [-p <passlist>] <address>
DESCRIPTION
smb-nat is a tool written to perform various security checks on systems offering the NetBIOS file sharing service. smb-nat will attempt to
retrieve all information availible from the remote server, and attempt to access any services provided by the server.
OPTIONS
-o Specify the output file. All results from the scan will be written to the specified file, in addition to standard output.
-u Specify the file to read usernames from. Usernames will be read from the specified file when attempting to guess the password on
the remote server. Usernames should appear one per line in the specified file. A sample username file can be found at
/usr/share/smb-nat/userlist.txt.
-p Specify the file to read passwords from. Passwords will be read from the specified file when attempting to guess the password on
the remote server. Passwords should appear one per line in the specified file. A sample password file can be found at
/usr/share/smb-nat/passlist.txt.
<address>
Addresses should be specified in comma deliminated format, with no spaces. Valid address specifications include:
hostname - "hostname" is added
127.0.0.1-127.0.0.3, adds addresses 127.0.0.1 through 127.0.0.3
127.0.0.1-3, adds addresses 127.0.0.1 through 127.0.0.3
127.0.0.1-3,7,10-20, adds addresses 127.0.0.1 through 127.0.0.3, 127.0.0.7, 127.0.0.10 through 127.0.0.20.
hostname,127.0.0.1-3, adds "hostname" and 127.0.0.1 through 127.0.0.1
All combinations of hostnames and address ranges as specified above are valid.
If no userlist or password list files are specified on the command line, a small set of defaults are used. This list includes the follow-
ing:
Usernames
"ADMINISTRATOR", "GUEST", "BACKUP", "ROOT", "ADMIN", "USER", "DEMO", "TEST", "SYSTEM", "OPERATOR", "OPER", "LOCAL"
Passwords
"ADMINISTRATOR", "GUEST", "ROOT", "ADMIN", "PASSWORD", "TEMP", "SHARE", "WRITE", "FULL", "BOTH", "READ", "FILES", "DEMO", "TEST",
"ACCESS", "USER", "BACKUP", "SYSTEM", "SERVER", "LOCAL"
The password guessing routines are written in such a way that all passwords are tried for all usernames. Keep this in mind when using
larger lists of passwords and usernames, as the time required increases exponentially with the size of these lists.
SUPPORTED PLATFORMS
This version of smb-nat has been tested against Windows NT 4.0 and various versions of the Samba server written by Andrew Tridgell.
This version of smb-nat has been tested and compiled on the following operating systems: Solaris 2.5, Linux 2.0, FreeBSD 2.1.5, OpenBSD
2.0, BSDI 2.1, Windows NT 4.0, Windows 95
FILES
smb-nat, /usr/share/smb-nat/userlist.txt, /usr/share/smb-nat/passlist.txt
NAT(1)