Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 715

NBT-NS Poisoning

What is NBT-NS Poisoning?

NBT-NS PoisoningAn adversary-in-the-middle attack that abuses legacy NetBIOS Name Service traffic on UDP/137 to spoof name responses and harvest NTLM authentications.


NetBIOS Name Service (NBT-NS) is a 30-year-old Windows name-resolution protocol that broadcasts UDP/137 queries when LLMNR also fails. NBT-NS poisoning, like LLMNR poisoning, lets any host on the local segment answer with its own IP, redirecting the victim's SMB or HTTP client to attacker infrastructure where its NTLMv2 credentials can be captured. NBT-NS broadcasts use 16-character padded names and a query-type byte, which Responder transparently handles. Disabling NetBIOS over TCP/IP on every interface via DHCP option 001 or through interface settings removes the fallback entirely. Because some legacy applications and older Windows clients still rely on it, defenders must inventory and migrate before disabling.

Examples

  1. 01

    Capturing the NTLMv2 hash of a domain admin who mistypes a server name while NetBIOS is still enabled.

  2. 02

    Spoofing the name WPAD over NBT-NS to inject a malicious proxy configuration on legacy hosts.

Frequently asked questions

What is NBT-NS Poisoning?

An adversary-in-the-middle attack that abuses legacy NetBIOS Name Service traffic on UDP/137 to spoof name responses and harvest NTLM authentications. It belongs to the Attacks & Threats category of cybersecurity.

What does NBT-NS Poisoning mean?

An adversary-in-the-middle attack that abuses legacy NetBIOS Name Service traffic on UDP/137 to spoof name responses and harvest NTLM authentications.

How does NBT-NS Poisoning work?

NetBIOS Name Service (NBT-NS) is a 30-year-old Windows name-resolution protocol that broadcasts UDP/137 queries when LLMNR also fails. NBT-NS poisoning, like LLMNR poisoning, lets any host on the local segment answer with its own IP, redirecting the victim's SMB or HTTP client to attacker infrastructure where its NTLMv2 credentials can be captured. NBT-NS broadcasts use 16-character padded names and a query-type byte, which Responder transparently handles. Disabling NetBIOS over TCP/IP on every interface via DHCP option 001 or through interface settings removes the fallback entirely. Because some legacy applications and older Windows clients still rely on it, defenders must inventory and migrate before disabling.

How do you defend against NBT-NS Poisoning?

Defences for NBT-NS Poisoning typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for NBT-NS Poisoning?

Common alternative names include: NBNS poisoning, NetBIOS Name Service spoofing.

Related terms