![Kevin Beaumont on Twitter: "if anybody wants to know what the network traffic for this looked like - initial connection on 445/TCP (most likely SMB fingerprinting for NetBIOS name), then lots of Kevin Beaumont on Twitter: "if anybody wants to know what the network traffic for this looked like - initial connection on 445/TCP (most likely SMB fingerprinting for NetBIOS name), then lots of](https://pbs.twimg.com/media/Ei4GnUsXYAETCfv.png)
Kevin Beaumont on Twitter: "if anybody wants to know what the network traffic for this looked like - initial connection on 445/TCP (most likely SMB fingerprinting for NetBIOS name), then lots of
![NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing](https://miloserdov.org/wp-content/uploads/2020/03/wireshark-nbss.png)
NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing
![Netbios filter commands, Appendix g netbios filter commands, Netbios filter commands (295) | ZyXEL Communications P-660H-Tx v2 User Manual | Page 295 / 312 | Original mode Netbios filter commands, Appendix g netbios filter commands, Netbios filter commands (295) | ZyXEL Communications P-660H-Tx v2 User Manual | Page 295 / 312 | Original mode](https://www.manualsdir.com/manuals/229324/295/zyxel-communications-p-660h-tx-v2-page295.png)
Netbios filter commands, Appendix g netbios filter commands, Netbios filter commands (295) | ZyXEL Communications P-660H-Tx v2 User Manual | Page 295 / 312 | Original mode
![NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing](https://miloserdov.org/wp-content/uploads/2020/03/wireshark-nbdgm.png)
NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing
![NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing](https://miloserdov.org/wp-content/uploads/2020/03/netbios-nmap-udp.png)
NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing
![NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing](https://miloserdov.org/wp-content/uploads/2020/03/wireshark-nbns-answer.png)
NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing
![NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing](https://miloserdov.org/wp-content/uploads/2020/03/wireshark-nbns.png)