Strap on your seatbelts ................ https://www.bleepingcomputer.com/ne...windows-versions-released-since-windows-2000/
Since many years there were the suspect and the convincement that USA security agencies had some kind of backdoor in Windows OS.....
Can you elaborate more? Or post link to some resource about hardening Windows authentication over network mechanisms. I am not connected to any Windows Domain. My laptop is just alone. Does this NBNS/NTLMv2 behavior is also present on Windows OSes in my configuration? I don't know anything about NTLMv2 and other Microsoft network authorization protocols. I just know basics of TCP/IP and UDP protocols.
Weird, it all comes down to any single word in the address bar in Chrome. That Twitter thread had a link with more context about the single word address bar purpose. Link: https://productforums.google.com/forum/#!topic/chrome/hl0Knv7p4-4 Although it is an older thread, it explains the single word search term issue more.
Here's a link to the POC on GitHub here: https://github.com/rapid7/metasploit-framework/pull/9473. On that web page is ref. to earlier like work described here: https://github.com/worawit/MS17-010. Although not a lot of low level detail exists, my understanding is these are exploiting the SMB protocol itself and are not directly related to SMBv1 and port 445 usage employed by EternalBlue.