Qualys flags some of our Windows servers with this vulnerability. According to the documentation:
QID 5005. NetBIOS Brute Force of Accounts. This QID is returned when brute forcing of a Windows host was successful. See the Result section of the vulnerability for a list of login/password combinations that were successful.
I don't believe Microsoft allows blank passwords via remote connection. I also tried: net use \\<ip address>\c$ and various other methods with no luck.
And so my question is how does Qualys exploit this vulnerability on a Windows box and how can I recreate? Thanks -