{"id":538,"date":"2007-06-20T04:41:15","date_gmt":"2007-06-20T04:41:15","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2007\/06\/fake-netbios-tool-simulate-windows-hosts\/"},"modified":"2015-09-09T19:40:07","modified_gmt":"2015-09-09T11:40:07","slug":"fake-netbios-tool-simulate-windows-hosts","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2007\/06\/fake-netbios-tool-simulate-windows-hosts\/","title":{"rendered":"Fake NetBIOS Tool – Simulate Windows Hosts"},"content":{"rendered":"
[ad]<\/p>\n
Some cool free tools made by folks from the French Honeynet Project.<\/p>\n
FakeNetBIOS is a family of tools designed to simulate Windows hosts on a LAN. The individual tools are:<\/p>\n
Each tool can be used as a standalone tool or as a honeyd responder or subsystem.<\/p>\n
FakeNetbiosDGM sends NetBIOS Datagram service packets on port UDP 138 to simulate Windows hosts bradcasts. It sends periodically NetBIOS announces over the network to simulate Windows computers. It fools the Computer Browser services running over the LAN and so on.<\/p>\n
FakeNetbiosNS is a NetBIOS Name Service daemon, listening on port UDP 137. It responds to NetBIOS Name requests like real Windows computers: for example ‘ping -a’, ‘nbtstat -A’ and ‘nbtstat -a’, etc.<\/p>\n
You can download the tools here:<\/p>\n
FakeNetBIOS-0.91.zip<\/a><\/p>\n There are a few others things here:<\/p>\n <\/p>\n