2022-12-29 01:37:26 +01:00
|
|
|
# SMB
|
|
|
|
|
|
|
|
## SMBClient
|
|
|
|
|
|
|
|
* Use `smbclient` to list the share
|
|
|
|
```sh
|
|
|
|
smbclient -L //$TARGET_IP/
|
|
|
|
```
|
|
|
|
* The protocol might be dated, try
|
|
|
|
```sh
|
|
|
|
smbclient -L //$TARGET_IP/ --option='client min protocol=NT1'
|
|
|
|
```
|
|
|
|
|
2022-11-13 22:52:30 +01:00
|
|
|
# smbmap
|
|
|
|
|
|
|
|
* [Repo](https://github.com/ShawnDEvans/smbmap.git)
|
|
|
|
* `python3 -m pip install -r requirements.txt`
|
|
|
|
|
|
|
|
# Usage
|
|
|
|
* `-x` execute command on server
|
|
|
|
* `-s` enumerate share
|
|
|
|
|
|
|
|
```sh
|
|
|
|
smbmap -u "admin" -p "password" -H "10.10.10.10" -x 'ipconfig'
|
|
|
|
```
|
2023-04-17 22:49:17 +02:00
|
|
|
|
|
|
|
## Enumerate Domain Users
|
|
|
|
|
|
|
|
List users of the domain through leaked credentials of an SMB user
|
|
|
|
```sh
|
|
|
|
crackmapexec smb example.com -u lowperm_user -p 'securepassword!' --users
|
|
|
|
```
|
|
|
|
|
|
|
|
Continue trying the found password on the users discovered in the step before
|
|
|
|
```sh
|
|
|
|
crackmapexec smb example.com -u domain_users.txt -p 'securepassword!' --continue-on-success
|
|
|
|
```
|
|
|
|
|
|
|
|
## Enumerate Writeable SMB shares
|
|
|
|
|
|
|
|
List writeable SMB shares for found domain users via impacket's psexec
|
|
|
|
```sh
|
|
|
|
psexec.py example.com/domain.user@example.com
|
|
|
|
```
|