Analyzing Microsoft’s NBNS and BOOTP Protocols with Wireshark for Red Teaming

by | Feb 21, 2024 | Articles, Write up

Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon

Reading Time: 3 Minutes

Introduction

Wireshark, a potent network protocol analyzer, is crucial to have in the arsenal of red teamers’ collection when it comes to network packet sniffing. This tool allows us to dissect and understand the inner workings of network traffic, providing invaluable insights for exploiting vulnerabilities. In this article, we’ll focus on two key services: BOOTP (Bootstrap Protocol) and NBNS (NetBIOS Name Service). Those are not very much known to many and hopefully show you how you can use them when you perform your Red Team engagements if it has to do with Internal Pentesting or Local Network enumeration techniques taking advantage of vulnerable such components by design that can be forgotten.

See Also: So you want to be a hacker?
Offensive Security and Ethical Hacking Course

 

Understanding NBNS and BOOTP

 

NBNS

NBNS stands for “NetBIOS Name Service,” which is a protocol used in older Windows-based networking environments to translate NetBIOS names (computer names) into IP addresses. NetBIOS (Network Basic Input/Output System) is a networking protocol that allows applications on different computers to communicate within a local area network (LAN). It was commonly used for file sharing, printer sharing, and other network-related functions.

BOOTP

BOOTP is an older protocol that uses a static address assignment process. BOOTP, an acronym for Bootstrap Protocol, served as a precursor to DHCP (Dynamic Host Configuration Protocol) and played a pivotal role in streamlining the process of assigning IP addresses to devices within a network. This protocol revolutionized network configuration by automating the allocation of IP addresses, thereby enhancing efficiency and reducing the manual intervention required for network setup.

 

Capturing Traffic

Wireshark is a free and open-source packet analyzer that allows users to capture and analyze the data traveling back and forth on a network in real time. Here’s how you can use these filters and techniques in the context of NBNS and BOOTP to obtain sensitive intel info:

Launch Wireshark and start capturing network traffic on the local network interface. Apply filters to specifically capture NBNS

 

NBNS vulnerabilities can be leveraged by Red Teamers to engage in NetBIOS name poisoning or spoofing attacks. By employing these strategies, attackers can redirect network traffic or initiate man-in-the-middle attacks, compromising the security and integrity of the targeted system. Very important to check whenever you are performing internal network assessments.

NBNS Spoofing can be implemented through Metasploit Framework by using a variety of modules that can capture the negotiated authentication challenge for protocols such as SMB and HTTP. For capturing the password hash over SMB.

 

Doing the same as before, launch Wireshark and start capturing network traffic on the local network interface. Apply filters to specifically capture BOOTP.

 

This is a packet capture from a router. We were troubleshooting DHCP packet flows. The router saw the DHCP Discover and Sent an Offer. We never saw the DHCP acknowledgment. In the adjacent core stacked switching, we were running “debug IP DHCP server packets” and we only saw discovered packets from IP phones up to the router.

 

Last Thoughts

We hope we successfully showed how to break down the techniques and filters utilized from this perspective, and showcased that Wireshark’s strength lies in its ability to capture, analyze, and filter network traffic by leveraging precise filters as shown earlier. Red teamers can intercept and scrutinize BOOTP and NBNS communications. This level of granularity is essential for identifying vulnerabilities, unauthorized devices, and potential weak points in a network’s defenses.

 

We hope that this write up has taught you something new. If you enjoyed it, the best way that you can support us is to share it! If you’d like to hear more about us, you can find us on LinkedInTwitterYouTube.

 

Are you a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to Information Security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

You can find it from our shop on our Patreon Channel:

Patreon

Recent Articles

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This