SMB
Basic SMB Enumeration and Exploitation
Basic Enumeration
# List all NetExec modules
netexec smb 172.16.8.139 -L
# Check SMB version
netexec smb 172.16.8.139
# Check SMB Service on subnet
netexec smb 172.16.8.139/24
# Check null auth
smbclient -L 192.168.1.2 --no-pass
smbclient //192.168.1.2/public --no-passEnumerate Null Sessions
Check if Null Session, also known as Anonymous session, is enabled on the network. Can be very useful on a Domain Controller to enumerate users, groups, password policies, etc.
netexec smb 172.16.8.139 -u 'nonexistusers' -p ''
netexec smb 172.16.8.139 -u 'nonexistusers' -p '' --sharesEnumerate Guest Logon
Using a random username and password you can check if the target accepts guest logon. If so, it means that either the domain guest account or the local guest account of the server you're targetting is enabled.
SMB Signing Not Required
Maps the network of live hosts and saves a list of only the hosts that don't require SMB signing. List format is one IP per line.
Reference:
Dictionary Attack and Password Spraying
Dictionary attack with username and password lists.
Password spraying with NetExec
Authenticated Enumeration
Shares check with credentials
Username enumeration on Workstation using valid credentials
Enum disk
Password Policy Check
Check password policy on Domain/Workstation
Example output:
Password Spraying
RID Cycling - Username Enumeration
SMBClient
Vuln Checks
Example output:
Updated soon...
Last updated
Was this helpful?