tag:blogger.com,1999:blog-9916663.post7740962242939781478..comments2023-08-25T00:39:33.143+10:00Comments on The Outspoken Wookie: NetBIOS AttacksHilton Travishttp://www.blogger.com/profile/05320101024049706410noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-9916663.post-60595404094889064512009-12-30T15:55:03.112+10:002009-12-30T15:55:03.112+10:00G'day Chris,
Making changes to *your* DHCP wi...G'day Chris,<br /><br />Making changes to *your* DHCP will make no difference when a laptop of yours with "Auto detect" enabled goes to a hotel with a vulnerable setup. That was the point I was making. :)<br /><br />Yeah, fondling the Hosts file will also help - but it is better to disable it altogether (and maybe still fondle Hosts in case it gets reenabled).Hilton Travishttps://www.blogger.com/profile/05320101024049706410noreply@blogger.comtag:blogger.com,1999:blog-9916663.post-83994476268913194312009-12-30T14:51:22.961+10:002009-12-30T14:51:22.961+10:00Disabling NetBIOS will mitigate NetBIOS spoofing. ...Disabling NetBIOS will mitigate NetBIOS spoofing. Adding a wpad entry in the Hosts file will lock down DNS lookups and will mitigate against rogue DHCP servers where the WPAD server is still named wpad.<br />But disabling Automatically detect settings is the best option. The other methods just close off part of the various hijacking methods.stryqxhttps://www.blogger.com/profile/11725668205462749500noreply@blogger.com