SMB Enumeration
Connect to share
smbclient \\\\$ip\\$sharenameEnumeration
# enum4linux
# default
enum4linux $ip
# runs all options
enum4linux -a $ip
# If you've obtained credentials => pull a full list of users regardless of the RestrictAnonymous option
enum4linux -u '$user' -p '$pass' -a $ip
# nmap
# enumerate smb shares, brute, get infos
nmap --script 'smb-enum-shares,smb-os-discovery,smb-brute,smb-system-info,smb-vuln*' -p 139,445 $ip
# netexec
# only in upgraded Windows servers from 2003 - No auth attempt
# Enumerate user shares anonymously
nxc smb $domainOrIP -u '' -p '' --shares
# to get password policy, minimum length, account lockout threshold
nxc smb $domainOrIP --pass-pol -u '' -p ''
# The usernames with RID greater than 1000 into a username file
nxc smb $domainOrIP -u robot -p '' --rid-brute | grep SidTypeUser
# smbmap
python3 smbmap.py --host-file smb-hosts.txt -d $domain -Lsmbmap
rpcclient | port 445
rpcclient | port 445Sub commands
rpcdump | MSRPC - port 135
rpcdump | MSRPC - port 135Microsoft RPC
NFS Shares
Last updated
Was this helpful?