Enumerating


### Enumeration :
>>>enum4linux -A $IP -oA enum4linux.txt
>>> smbmap -H $IP																				[checks for permission ]
>>> smbmap -u ceso -H $IP																		[ If We Have User:Pass ]
>>> smbmap -H $IP -v 
>>> nmblookup -A $IP
>>> crackmapexec smb $IP
>>> nbtscan -r $IP/24
>>> nmblookup -A $IP

----------------------------------------------------------------------------------------------------------------
###List Shares:
>>> smbclient -L $IP
----------------------------------------------------------------------------------------------------------------
### Null Sessions :
>>> rpcclient -U "" $IP
>>> /usr/share/doc/python3-impacket/examples/smbclient.py ""@$IP
----------------------------------------------------------------------------------------------------------------

### Vulnerability Scan :

>>> nmap --script=smb-vuln* --script-args=unsafe=1 -T5 $IP

>>> nmap -sV -Pn -vv -p 445 --script='(smb*) and not (brute or broadcast or dos or external or fuzzer)' --script-args=unsafe=1 $IP

>>> nmap --script smb-enum-*,smb-vuln-*,smb-ls.nse,smb-mbenum.nse,smb-os-discovery.nse,smb-print-text.nse,smb-psexec.nse,smb-security-mode.nse,smb-server-stats.nse,smb-system-info.nse,smb-protocols -p 139,445 $IP

>>> nmap --script smb-enum-domains.nse,smb-enum-groups.nse,smb-enum-processes.nse,smb-enum-sessions.nse,smb-enum-shares.nse,smb-enum-users.nse,smb-ls.nse,smb-mbenum.nse,smb-os-discovery.nse,smb-print-text.nse,smb-psexec.nse,smb-security-mode.nse,smb-server-stats.nse,smb-system-info.nse,smb-vuln-conficker.nse,smb-vuln-cve2009-3103.nse,smb-vuln-ms06-025.nse,smb-vuln-ms07-029.nse,smb-vuln-ms08-067.nse,smb-vuln-ms10-054.nse,smb-vuln-ms10-061.nse,smb-vuln-regsvc-dos.nse -p 139,445 $IP

Getting Version : 
>>> msfconsole; use scanner/smb/smb_version; set RHOSTS $ip; run

----------------------------------------------------------------------------------------------------------------
# rpcclient commands
>>> rpcclient -U "" $IP
	srvinfo
	enumdomusers
	getdompwinfo
	querydominfo
	netshareenum
	netshareenumall
----------------------------------------------------------------------------------------------------------------

### Run cmd over smb from linux
>>> winexe -U username //10.11.1.111 "cmd.exe" --system

----------------------------------------------------------------------------------------------------------------



====Aaj_Ki_Baat_Windows_Ke_Saath==========================→ 

### Mounting it in Windows with Powershell :
>>> New-PSDrive -Name "tools" -PSProvider "Filesystem" -Root "\\$IP\tools"
>>> net use z: \\$IP\tools"														     [ Without Power-Shell ]
----------------------------------------------------------------------------------------------------------------
### list mounteda shares :
>>> Get-SMBShare																				[ With Power-Shell ]
>>> net share																					[ Without Power-Shell ]

----------------------------------------------------------------------------------------------------------------

Last updated