<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NetBIOS Brute Force of Accounts in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/NetBIOS-Brute-Force-of-Accounts/m-p/37324#M3432</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;IT security area have sent us this alarm related to a NAS.&lt;/P&gt;&lt;P&gt;Does Someone know about IT? How must we fix it?&lt;/P&gt;&lt;P&gt;Below I have attached further details about it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THREAT:&lt;/P&gt;&lt;P&gt;User access (login and password) was obtained during a brute force attack session.&lt;/P&gt;&lt;P&gt;IMPACT:&lt;/P&gt;&lt;P&gt;Unauthorized users can penetrate your shared files, steal data, and rapidly&lt;/P&gt;&lt;P&gt;compromise this host. The account shown below was obtained using a brute force&lt;/P&gt;&lt;P&gt;method.&lt;/P&gt;&lt;P&gt;SOLUTION:&lt;/P&gt;&lt;P&gt;Please change the user password or disable it completely. You should also review&lt;/P&gt;&lt;P&gt;your password policy and eliminate guessable passwords.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Jun 2025 06:08:42 GMT</pubDate>
    <dc:creator>ROGERIO24</dc:creator>
    <dc:date>2025-06-05T06:08:42Z</dc:date>
    <item>
      <title>NetBIOS Brute Force of Accounts</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/NetBIOS-Brute-Force-of-Accounts/m-p/37324#M3432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;IT security area have sent us this alarm related to a NAS.&lt;/P&gt;&lt;P&gt;Does Someone know about IT? How must we fix it?&lt;/P&gt;&lt;P&gt;Below I have attached further details about it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THREAT:&lt;/P&gt;&lt;P&gt;User access (login and password) was obtained during a brute force attack session.&lt;/P&gt;&lt;P&gt;IMPACT:&lt;/P&gt;&lt;P&gt;Unauthorized users can penetrate your shared files, steal data, and rapidly&lt;/P&gt;&lt;P&gt;compromise this host. The account shown below was obtained using a brute force&lt;/P&gt;&lt;P&gt;method.&lt;/P&gt;&lt;P&gt;SOLUTION:&lt;/P&gt;&lt;P&gt;Please change the user password or disable it completely. You should also review&lt;/P&gt;&lt;P&gt;your password policy and eliminate guessable passwords.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 06:08:42 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/NetBIOS-Brute-Force-of-Accounts/m-p/37324#M3432</guid>
      <dc:creator>ROGERIO24</dc:creator>
      <dc:date>2025-06-05T06:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: NetBIOS Brute Force of Accounts</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/NetBIOS-Brute-Force-of-Accounts/m-p/37329#M3434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess this simply means someone, presumably someone performing a security audit on your network, was able to get access to your NAS storage system because at least one account on it had a weak password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You basically need to set up your systems with strong passwords ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Mar 2013 10:22:40 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/NetBIOS-Brute-Force-of-Accounts/m-p/37329#M3434</guid>
      <dc:creator>uptimenow</dc:creator>
      <dc:date>2013-03-03T10:22:40Z</dc:date>
    </item>
  </channel>
</rss>

