SMB (137,138,139,445)
OS Discovery using smb
nmap --script smb-os-discovery.nse -p445 10.10.10.40Enumerate Hostnames
nmblookup -A $ipList Shares
smbmap -H $ip
smbmap -H $ip -u alex -p lol123\!mDsmbclient -N -L \\\\$ipnmap --script smb-enum-shares -p 139,445 $ipNull Sessions
smbmap -H $iprpcclient -U "" -N $ipsmbclient \\\\$ip\$sharename
smbclient \\\\$ip\$sharename -U username%password #authenticatedVuln Checking or use -sC for default scripts
Scanning
Misconfigurations
Anonymous Authentication
Listing File Shares
Downloading and Uploading Files
RPC Client (enumerate users)
Protocol Specific Attacks
Password Bruteforce and Spray Attacks
Remote Code Execution
Impacket PsExec, SMBSexec, and atexec
CrackMapExec
Extract Hashes from SAM database
Enumerating Logged on Users
Pass the Hash
Forced Authentication Attacks (Responder)
Cracking the NTLM Hash
For RPC
Last updated