description = [[ Attempts to retrieve the target's NetBIOS names and MAC address. By default, the script displays the name of the computer and the logged-in user; if the verbosity is turned up, it displays all names the system thinks it owns. ]] --- -- @usage -- sudo nmap -sU --script nbstat.nse -p137 \n -- -- @output -- (no verbose)\n -- |_ nbstat: NetBIOS name: TST, NetBIOS user: RON, NetBIOS MAC: 00:0c:29:f9:d9:28\n --\n -- (verbose)\n -- | nbstat: NetBIOS name: TST, NetBIOS user: RON, NetBIOS MAC: 00:0c:29:f9:d9:28\n -- | Name: TST<00> Flags: \n -- | Name: TST<20> Flags: \n -- | Name: WORKGROUP<00> Flags: \n -- | Name: TST<03> Flags: \n -- | Name: WORKGROUP<1e> Flags: \n -- | Name: RON<03> Flags: \n -- | Name: WORKGROUP<1d> Flags: \n -- |_ Name: \x01\x02__MSBROWSE__\x02<01> Flags: \n author = "Brandon Enright , Ron Bowes" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" -- Current version of this script was based entirly on Implementing CIFS, by -- Christopher R. Hertel. categories = {"default", "discovery", "safe"} require "netbios" hostrule = function(host) -- The following is an attempt to only run this script against hosts -- that will probably respond to a UDP 137 probe. One might argue -- that sending a single UDP packet and waiting for a response is no -- big deal and that it should be done for every host. In that case -- simply change this rule to always return true. local port_t135 = nmap.get_port_state(host, {number=135, protocol="tcp"}) local port_t139 = nmap.get_port_state(host, {number=139, protocol="tcp"}) local port_t445 = nmap.get_port_state(host, {number=445, protocol="tcp"}) local port_u137 = nmap.get_port_state(host, {number=137, protocol="udp"}) return (port_t135 ~= nil and port_t135.state == "open") or (port_t139 ~= nil and port_t139.state == "open") or (port_t445 ~= nil and port_t445.state == "open") or (port_u137 ~= nil and (port_u137.state == "open" or port_u137.state == "open|filtered")) end action = function(host) local i local status local names, statistics local server_name, user_name local mac local result = "" -- Get the list of NetBIOS names status, names, statistics = netbios.do_nbstat(host.ip) status, names, statistics = netbios.do_nbstat(host.ip) status, names, statistics = netbios.do_nbstat(host.ip) status, names, statistics = netbios.do_nbstat(host.ip) if(status == false) then return "ERROR: " .. names end -- Get the server name status, server_name = netbios.get_server_name(host.ip, names) if(status == false) then return "ERROR: " .. server_name end -- Get the logged in user status, user_name = netbios.get_user_name(host.ip, names) if(status == false) then return "ERROR: " .. user_name end -- Format the Mac address in the standard way mac = string.format("%02x:%02x:%02x:%02x:%02x:%02x", statistics:byte(1), statistics:byte(2), statistics:byte(3), statistics:byte(4), statistics:byte(5), statistics:byte(6)) -- Samba doesn't set the Mac address if(mac == "00:00:00:00:00:00") then mac = "" end -- Check if we actually got a username if(user_name == nil) then user_name = "" end result = result .. string.format("NetBIOS name: %s, NetBIOS user: %s, NetBIOS MAC: %s\n", server_name, user_name, mac) -- If verbosity is set, dump the whole list of names if(nmap.verbosity() >= 1) then for i = 1, #names, 1 do local padding = string.rep(" ", 17 - string.len(names[i]['name'])) local flags_str = netbios.flags_to_string(names[i]['flags']) result = result .. string.format("Name: %s<%02x>%sFlags: %s\n", names[i]['name'], names[i]['suffix'], padding, flags_str) end -- If super verbosity is set, print out the full statistics if(nmap.verbosity() >= 2) then result = result .. "Statistics: " for i = 1, #statistics, 1 do result = result .. string.format("%02x ", statistics:byte(i)) end result = result .. "\n" end end return result end