NetBIOS in the hands of a hacker
This article will briefly talk about what such a familiar-looking thing as NetBIOS can tell us. What information can it provide for a potential attacker/pentester. The demonstrated scope of reconnaissance techniques relates to internal, that is, isolated and inaccessible networks. As a rule, any even the smallest company has such networks. Myself […]