Fake NetBIOS Tool – Simulate Windows Hosts

Find your website's Achilles' Heel


Some cool free tools made by folks from the French Honeynet Project.

FakeNetBIOS is a family of tools designed to simulate Windows hosts on a LAN. The individual tools are:

  • FakeNetbiosDGM (NetBIOS Datagram)
  • FakeNetbiosNS (NetBIOS Name Service)

Each tool can be used as a standalone tool or as a honeyd responder or subsystem.

FakeNetbiosDGM sends NetBIOS Datagram service packets on port UDP 138 to simulate Windows hosts bradcasts. It sends periodically NetBIOS announces over the network to simulate Windows computers. It fools the Computer Browser services running over the LAN and so on.

FakeNetbiosNS is a NetBIOS Name Service daemon, listening on port UDP 137. It responds to NetBIOS Name requests like real Windows computers: for example ‘ping -a’, ‘nbtstat -A’ and ‘nbtstat -a’, etc.

You can download the tools here:

FakeNetBIOS-0.91.zip

There are a few others things here:

http://honeynet.rstack.org/tools.php


Posted in: Hacking Tools, Network Hacking, Windows Hacking

, , , , , , , ,

Recent in Hacking Tools:
- MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool
- BBQSQL – Blind SQL Injection Framework
- DET – Data Exfiltration Toolkit

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,991,810 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,476,054 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 686,875 views

Get protected with Sucuri


3 Responses to Fake NetBIOS Tool – Simulate Windows Hosts

  1. backbone June 20, 2007 at 8:30 pm #

    now new ppl in security can test the basics in a simulated environment… or catch hackers (|| script kiddies) :)

  2. Daniel June 20, 2007 at 10:05 pm #

    honeypot FTW
    no seriously, nice post

Trackbacks/Pingbacks

  1. Honeypot: come scoprire nuovi exploit “zero day” « 2BFree Underground - June 20, 2007

    […] Darknet Honeynet Project Eurecom Leurrecom Honeypot Project Sicurezza delle reti & gli Honeypots Allestimento di Honeypots […]