137,138,139 - Pentesting NetBios

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

NetBios Name Service

NetBIOS Name Service๋Š” ์ด๋ฆ„ ๋“ฑ๋ก ๋ฐ ํ•ด์ƒ๋„, ๋ฐ์ดํ„ฐ๊ทธ๋žจ ๋ฐฐํฌ, ์„ธ์…˜ ์„œ๋น„์Šค์™€ ๊ฐ™์€ ๋‹ค์–‘ํ•œ ์„œ๋น„์Šค๋ฅผ ํฌํ•จํ•˜์—ฌ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋ฉฐ, ๊ฐ ์„œ๋น„์Šค์— ๋Œ€ํ•ด ํŠน์ • ํฌํŠธ๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค.

From Wikidepia:

  • ์ด๋ฆ„ ๋“ฑ๋ก ๋ฐ ํ•ด์ƒ๋„๋ฅผ ์œ„ํ•œ ์ด๋ฆ„ ์„œ๋น„์Šค (ํฌํŠธ: 137/udp ๋ฐ 137/tcp).
  • ์—ฐ๊ฒฐ ์—†๋Š” ํ†ต์‹ ์„ ์œ„ํ•œ ๋ฐ์ดํ„ฐ๊ทธ๋žจ ๋ฐฐํฌ ์„œ๋น„์Šค (ํฌํŠธ: 138/udp).
  • ์—ฐ๊ฒฐ ์ง€ํ–ฅ ํ†ต์‹ ์„ ์œ„ํ•œ ์„ธ์…˜ ์„œ๋น„์Šค (ํฌํŠธ: 139/tcp).

Name Service

์žฅ์น˜๊ฐ€ NetBIOS ๋„คํŠธ์›Œํฌ์— ์ฐธ์—ฌํ•˜๋ ค๋ฉด ๊ณ ์œ ํ•œ ์ด๋ฆ„์„ ๊ฐ€์ ธ์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” โ€œ์ด๋ฆ„ ์ฟผ๋ฆฌโ€ ํŒจํ‚ท์ด ์ „์†ก๋˜๋Š” ๋ธŒ๋กœ๋“œ์บ์ŠคํŠธ ํ”„๋กœ์„ธ์Šค๋ฅผ ํ†ตํ•ด ์ด๋ฃจ์–ด์ง‘๋‹ˆ๋‹ค. ์ด์˜ ์ œ๊ธฐ๊ฐ€ ์—†์œผ๋ฉด ์ด๋ฆ„์€ ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ๊ฒƒ์œผ๋กœ ๊ฐ„์ฃผ๋ฉ๋‹ˆ๋‹ค. ๋˜๋Š” ์ด๋ฆ„ ์„œ๋น„์Šค ์„œ๋ฒ„์— ์ง์ ‘ ์ฟผ๋ฆฌํ•˜์—ฌ ์ด๋ฆ„์˜ ๊ฐ€์šฉ์„ฑ์„ ํ™•์ธํ•˜๊ฑฐ๋‚˜ ์ด๋ฆ„์„ IP ์ฃผ์†Œ๋กœ ํ•ด์„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. nmblookup, nbtscan, nmap๊ณผ ๊ฐ™์€ ๋„๊ตฌ๋Š” NetBIOS ์„œ๋น„์Šค๋ฅผ ์—ด๊ฑฐํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜์–ด ์„œ๋ฒ„ ์ด๋ฆ„๊ณผ MAC ์ฃผ์†Œ๋ฅผ ๋“œ๋Ÿฌ๋ƒ…๋‹ˆ๋‹ค.

PORT    STATE SERVICE    VERSION
137/udp open  netbios-ns Samba nmbd netbios-ns (workgroup: WORKGROUP)

NetBIOS ์„œ๋น„์Šค๋ฅผ ์—ด๊ฑฐํ•˜๋ฉด ์„œ๋ฒ„๊ฐ€ ์‚ฌ์šฉํ•˜๋Š” ์ด๋ฆ„๊ณผ ์„œ๋ฒ„์˜ MAC ์ฃผ์†Œ๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

nmblookup -A <IP>
nbtscan <IP>/30
sudo nmap -sU -sV -T4 --script nbstat.nse -p137 -Pn -n <IP>

Datagram Distribution Service

NetBIOS datagrams๋Š” UDP๋ฅผ ํ†ตํ•ด ์—ฐ๊ฒฐ ์—†๋Š” ํ†ต์‹ ์„ ํ—ˆ์šฉํ•˜๋ฉฐ, ์ง์ ‘ ๋ฉ”์‹œ์ง€๋ฅผ ์ „์†กํ•˜๊ฑฐ๋‚˜ ๋ชจ๋“  ๋„คํŠธ์›Œํฌ ์ด๋ฆ„์— ๋ธŒ๋กœ๋“œ์บ์ŠคํŒ…ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์„œ๋น„์Šค๋Š” ํฌํŠธ 138/udp๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค.

PORT    STATE         SERVICE     VERSION
138/udp open|filtered netbios-dgm

์„ธ์…˜ ์„œ๋น„์Šค

์—ฐ๊ฒฐ ์ง€ํ–ฅ ์ƒํ˜ธ์ž‘์šฉ์„ ์œ„ํ•ด, ์„ธ์…˜ ์„œ๋น„์Šค๋Š” ๋‘ ์žฅ์น˜ ๊ฐ„์˜ ๋Œ€ํ™”๋ฅผ ์ด‰์ง„ํ•˜๋ฉฐ, TCP ์—ฐ๊ฒฐ์„ ํ†ตํ•ด ํฌํŠธ 139/tcp๋ฅผ ํ™œ์šฉํ•ฉ๋‹ˆ๋‹ค. ์„ธ์…˜์€ โ€œ์„ธ์…˜ ์š”์ฒญโ€ ํŒจํ‚ท์œผ๋กœ ์‹œ์ž‘๋˜๋ฉฐ, ์‘๋‹ต์— ๋”ฐ๋ผ ์„ค์ •๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์„œ๋น„์Šค๋Š” ๋” ํฐ ๋ฉ”์‹œ์ง€, ์˜ค๋ฅ˜ ๊ฐ์ง€ ๋ฐ ๋ณต๊ตฌ๋ฅผ ์ง€์›ํ•˜๋ฉฐ, TCP๋Š” ํ๋ฆ„ ์ œ์–ด ๋ฐ ํŒจํ‚ท ์žฌ์ „์†ก์„ ์ฒ˜๋ฆฌํ•ฉ๋‹ˆ๋‹ค.

์„ธ์…˜ ๋‚ด ๋ฐ์ดํ„ฐ ์ „์†ก์€ ์„ธ์…˜ ๋ฉ”์‹œ์ง€ ํŒจํ‚ท์„ ํฌํ•จํ•˜๋ฉฐ, ์„ธ์…˜์€ TCP ์—ฐ๊ฒฐ์„ ๋‹ซ์Œ์œผ๋กœ์จ ์ข…๋ฃŒ๋ฉ๋‹ˆ๋‹ค.

์ด ์„œ๋น„์Šค๋Š” NetBIOS ๊ธฐ๋Šฅ์— ํ•„์ˆ˜์ ์ด๋ฉฐ, ๋„คํŠธ์›Œํฌ ์ „๋ฐ˜์— ๊ฑธ์ณ ํšจ์œจ์ ์ธ ํ†ต์‹  ๋ฐ ์ž์› ๊ณต์œ ๋ฅผ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. TCP ๋ฐ IP ํ”„๋กœํ† ์ฝœ์— ๋Œ€ํ•œ ์ž์„ธํ•œ ์ •๋ณด๋Š” ๊ฐ๊ฐ์˜ TCP Wikipedia ๋ฐ IP Wikipedia ํŽ˜์ด์ง€๋ฅผ ์ฐธ์กฐํ•˜์‹ญ์‹œ์˜ค.

PORT      STATE SERVICE      VERSION
139/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn

๋‹ค์Œ ํŽ˜์ด์ง€๋ฅผ ์ฝ์–ด ์ด ์„œ๋น„์Šค๋ฅผ ์—ด๊ฑฐํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ๋ฐฐ์šฐ์„ธ์š”:

137,138,139 - Pentesting NetBios

HackTricks ์ž๋™ ๋ช…๋ น

Protocol_Name: Netbios    #Protocol Abbreviation if there is one.
Port_Number:  137,138,139     #Comma separated if there is more than one.
Protocol_Description: Netbios         #Protocol Abbreviation Spelled out

Entry_1:
Name: Notes
Description: Notes for NetBios
Note: |
Name service for name registration and resolution (ports: 137/udp and 137/tcp).
Datagram distribution service for connectionless communication (port: 138/udp).
Session service for connection-oriented communication (port: 139/tcp).

For a device to participate in a NetBIOS network, it must have a unique name. This is achieved through a broadcast process where a "Name Query" packet is sent. If no objections are received, the name is considered available. Alternatively, a Name Service server can be queried directly to check for name availability or to resolve a name to an IP address.

https://book.hacktricks.wiki/en/network-services-pentesting/137-138-139-pentesting-netbios.html

Entry_2:
Name: Find Names
Description: Three scans to find the names of the server
Command: nmblookup -A {IP} &&&& nbtscan {IP}/30 &&&& nmap -sU -sV -T4 --script nbstat.nse -p 137 -Pn -n {IP}

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ