💻
my_offsec_notes
  • Intro
  • Enumeration
    • Network Discovery
      • Arp
      • NetDiscover
      • TCPDump
    • DNS Enumeration
      • Find E-mail Addresses
      • Zone Transfer
    • Scanning
      • Nmap
        • FlaconSpy.py
        • NSE
      • AutoRecon
      • onetwopunch.sh
      • nc
      • Nikto Scan
      • Banner Grabbing
    • brute forcing the web
    • my recon cheat-sheet
      • Comman
    • Passive Enum
  • Starting web services
  • âš“Common Ports
    • TCP
      • Samba
        • Enumerating
        • Accessing
      • LDap
      • Domain (53)
      • NFS
      • MSRPC (135)
      • SMTP
      • MSRPC
      • FTP
        • BRUTE FORCING
      • KERBEROS (88)
      • POP3
      • RPC-BIND
      • SQL
        • MYSQL
          • My-SQL Root Access
          • Access
        • MS-SQL
          • Access
      • HTTP/HTTPS
        • WEB TECHNOLOGY
          • WORD-PRESS
          • DRUPAL
          • JOOMLA
          • WebDav
          • JENKINS
          • FLASK
          • PHP
          • J-BOSS
        • DIRECTORY/FILES FUZZING
        • LOGIN PAGE
        • TOMCAT
      • ORACLE (1521)
      • SSH
      • RDP (3389)
      • Redis
      • Rsync
      • Netbios (137)
      • Memcached (11211)
      • SSL (443)
      • Finger (79)
      • RPC (1024 to 5000)
    • ALL-ROUNDER
    • UDP
      • SNMP (161)
      • TFTP
  • PORT KNOCKING
  • ENUMERATING USERS
    • ENUM HASHES
  • Exploitation
    • Web Site Exploitation Vectors
      • LFI
        • Config Files
          • Linux
          • Windows
        • Some Useful
      • RFI
      • XXE
      • XSS
      • SQLi
        • NoSQL-Map
        • SQL-Map
      • SSTI
    • Accessing Target Machine
      • Windows
      • Linux
    • Exploits
  • Buffer Overflow
    • useful commands
    • Buffer Overflow Prep ("THM")
  • Creating Reverse Shells
    • Online Resources
    • Windows
    • Linux
    • Mac
    • Gifts for Web Pages
      • Scripting Languages
    • Common One liners
  • Active Directory
    • Enumeration
    • my A.D. Cheat-Sheet
    • After Getting D.C.
  • Priv-Esc
    • Windows
      • whoami /privs
      • Writable Service Executable
      • Cheat sheet
      • Unquoted Service Path
    • Linux
      • Cheat sheet
      • Cronjob
      • Docker (Group)
        • Docker GTFO
      • LXD (Group)
      • sudo+LD_PRELOAD
      • Mysql
        • MySQL (root access)
      • sudo<1.8.28
  • Break-Out Commands
    • Jailed SSH
    • Spawn a Bash shell for me
  • Password Attacks
  • PORT FORWARDING / TUNNELING
  • Post Exploitation
    • injecting Backdoors
  • Machines
    • Template
    • Hack The Box
      • Late
    • Try Hack Me
    • P.G. Grounds
    • Vuln-Hub
Powered by GitBook
On this page
  1. Common Ports
  2. TCP
  3. Samba

Enumerating


### Enumeration :
>>>enum4linux -A $IP -oA enum4linux.txt
>>> smbmap -H $IP																				[checks for permission ]
>>> smbmap -u ceso -H $IP																		[ If We Have User:Pass ]
>>> smbmap -H $IP -v 
>>> nmblookup -A $IP
>>> crackmapexec smb $IP
>>> nbtscan -r $IP/24
>>> nmblookup -A $IP

----------------------------------------------------------------------------------------------------------------
###List Shares:
>>> smbclient -L $IP
----------------------------------------------------------------------------------------------------------------
### Null Sessions :
>>> rpcclient -U "" $IP
>>> /usr/share/doc/python3-impacket/examples/smbclient.py ""@$IP
----------------------------------------------------------------------------------------------------------------

### Vulnerability Scan :

>>> nmap --script=smb-vuln* --script-args=unsafe=1 -T5 $IP

>>> nmap -sV -Pn -vv -p 445 --script='(smb*) and not (brute or broadcast or dos or external or fuzzer)' --script-args=unsafe=1 $IP

>>> nmap --script smb-enum-*,smb-vuln-*,smb-ls.nse,smb-mbenum.nse,smb-os-discovery.nse,smb-print-text.nse,smb-psexec.nse,smb-security-mode.nse,smb-server-stats.nse,smb-system-info.nse,smb-protocols -p 139,445 $IP

>>> nmap --script smb-enum-domains.nse,smb-enum-groups.nse,smb-enum-processes.nse,smb-enum-sessions.nse,smb-enum-shares.nse,smb-enum-users.nse,smb-ls.nse,smb-mbenum.nse,smb-os-discovery.nse,smb-print-text.nse,smb-psexec.nse,smb-security-mode.nse,smb-server-stats.nse,smb-system-info.nse,smb-vuln-conficker.nse,smb-vuln-cve2009-3103.nse,smb-vuln-ms06-025.nse,smb-vuln-ms07-029.nse,smb-vuln-ms08-067.nse,smb-vuln-ms10-054.nse,smb-vuln-ms10-061.nse,smb-vuln-regsvc-dos.nse -p 139,445 $IP

Getting Version : 
>>> msfconsole; use scanner/smb/smb_version; set RHOSTS $ip; run

----------------------------------------------------------------------------------------------------------------
# rpcclient commands
>>> rpcclient -U "" $IP
	srvinfo
	enumdomusers
	getdompwinfo
	querydominfo
	netshareenum
	netshareenumall
----------------------------------------------------------------------------------------------------------------

### Run cmd over smb from linux
>>> winexe -U username //10.11.1.111 "cmd.exe" --system

----------------------------------------------------------------------------------------------------------------



====Aaj_Ki_Baat_Windows_Ke_Saath==========================→ 

### Mounting it in Windows with Powershell :
>>> New-PSDrive -Name "tools" -PSProvider "Filesystem" -Root "\\$IP\tools"
>>> net use z: \\$IP\tools"														     [ Without Power-Shell ]
----------------------------------------------------------------------------------------------------------------
### list mounteda shares :
>>> Get-SMBShare																				[ With Power-Shell ]
>>> net share																					[ Without Power-Shell ]

----------------------------------------------------------------------------------------------------------------

PreviousSambaNextAccessing

Last updated 2 years ago

âš“