Exposes sensitive information through enumeration attacks.
Susceptible to spoofing and DoS attacks.
Can be exploited for credential theft.
Disable NetBIOS if not needed.
Use strong authentication and encryption.
Limit NetBIOS traffic to internal networks only.
Unauthorized NetBIOS name requests.
Unexpected NetBIOS traffic in network logs.
Brute-force attempts against NetBIOS resources.
Last updated 1 year ago