SMB

Basic SMB Enumeration and Exploitation

Basic Enumeration

# List all NetExec modules
netexec smb 172.16.8.139 -L
# Check SMB version
netexec smb 172.16.8.139
# Check SMB Service on subnet
netexec smb 172.16.8.139/24

# Check null auth
smbclient -L 192.168.1.2 --no-pass
smbclient //192.168.1.2/public --no-pass

Enumerate Null Sessions

Check if Null Session, also known as Anonymous session, is enabled on the network. Can be very useful on a Domain Controller to enumerate users, groups, password policies, etc.

netexec smb 172.16.8.139 -u 'nonexistusers' -p ''
netexec smb 172.16.8.139 -u 'nonexistusers' -p '' --shares

Enumerate Guest Logon

Using a random username and password you can check if the target accepts guest logon. If so, it means that either the domain guest account or the local guest account of the server you're targetting is enabled.

SMB Signing Not Required

Maps the network of live hosts and saves a list of only the hosts that don't require SMB signing. List format is one IP per line.

Reference:

Dictionary Attack and Password Spraying

Dictionary attack with username and password lists.

Password spraying with NetExec

Authenticated Enumeration

Shares check with credentials

Username enumeration on Workstation using valid credentials

Enum disk

Password Policy Check

Check password policy on Domain/Workstation

Example output:

Password Spraying

RID Cycling - Username Enumeration

SMBClient

Vuln Checks

Example output:

Updated soon...

Last updated

Was this helpful?