0xSs0rZ
CtrlK
  • Hello World
  • Whoami
  • Interesting Books
  • Pentest
    • CheckLists
    • Recon
    • Protocols
    • Brute force
    • Shells
    • File Transfer
    • Web attacks
    • API
    • Public Exploit
    • External Pentest
    • Internal Pentest
      • Tools
      • Methodology & Cheatsheet
      • Basic Windows Commands
      • Network Attacks
      • LLMNR NBT-NS Poisoning
      • ADIDNS Spoofing
      • TimeRoast
      • Users Identification
      • Password Policy
      • Password Spray
      • LDAP Pass Back Attack
      • Reconaissance
      • Microsoft Office & Outlook
      • Microsoft SharePoint
      • Windows Exploit
      • Print Spooler
      • LOL Bins
      • Security Controls
      • Network Shares
      • RDWA
      • Kerberoast
      • Misconfiguration
      • Pre-Created Computer Accounts
      • Privileged Access
      • ACL
      • Privilege escalation
      • SAM & LSA secrets
      • NTLM Hashes
      • LSASS secrets
      • AD CS
      • DPAPI
      • gMSA
      • dMSA - Windows Server 2025
      • Bypass Powershell Execution Policy
      • Disable / Remove AV Defender and Firewall
      • Kerberos Double Hop Problem
      • SCCM
      • MDT
      • AD FS
      • Trustee and Resource Delegation
      • LAPS
      • DCSync
      • NTDS secrets
      • Domain Password Audit Tools
      • Trusts
      • Persistence
      • Tiering
      • Detection
    • Privilege Escalation
    • Post Exploitation
    • Cracking
    • Thick Client Pentest
    • Wifi Pentest
    • Mobile Pentest
    • Configuration Audit / Hardening
    • Code Analysis
    • Tools
    • Search Engines
    • Cheatsheets
    • Note Keeping / Reporting / Admin Stuff
  • Cloud
    • Cloud VM
    • Enumeration
    • SSRF / RCE
    • Azure
    • AWS
    • GCP
    • Kubernetes
    • Tools
  • Labs
  • Antivirus Evasion - Defender
    • Mindmap
    • Defender Module for PowerShell
    • Static Analysis
    • Dynamic Analysis
    • AMSI Bypass
    • Process Injection
    • Open-Source Software
    • User Access Control (UAC)
    • AppLocker
    • LOLBAS / LOLDrivers / LOLESXi
    • PowerShell ConstrainedLanguage Mode, CLM
    • VBScript
    • Bypass all Powershell security features (AMSI,CLM)
    • Bypass AV Payload / Shells
    • Find Folder Exclusions
    • Resources
  • EDR BYPASS
    • Approches for Evasion
    • Tools
    • Obfuscation
    • EDR Killer
    • BYOVD
    • Spoof Command Line Arguments
    • Blind Spots
    • Living Off Security Tools / LOTTunels
    • Process Hollowing
    • Process Injection - Reverse Shell
    • Payload Creation
    • Shellcode Loader
    • MalDev
    • Malware Testing Lab
    • Resources
  • Red Team
    • OpSec / Anonymity
    • Initial Access
    • Infrastructure (phishing, C2, redirector)
    • C2
    • EDR / AV Bypass
    • Physical Penetration Testing
    • Bypass Bitlocker
    • Resources
  • CTF
    • OSINT
    • Forensic
    • Cryptography
    • Steganography
    • Write Up
Powered by GitBook
On this page
  • NFS (Network File System)
  • SMB (Server Message Block)
  • FindUncommonShares
  • DumpShares
  • Manspider
  • Snaffler
  • NXC - CME
  • Resources
  1. Pentest
  2. Internal Pentest

Network Shares

ko-fi

NFS (Network File System)

NFS (2049, 111)
LogoNFS Security: Identifying and Exploiting Misconfigurations | HvS-ConsultingHvS-Consulting
LogoGitHub - hvs-consulting/nfs-security-tooling: Detect common NFS server misconfigurationsGitHub

SMB (Server Message Block)

SMB (445, 139) / RPC

Null and guest session

nxc smb 10.10.97.255 -u '' -p '' --shares
nxc smb 10.10.97.255 -u 'guest' -p '' --shares

FindUncommonShares

LogoGitHub - p0dalirius/pyFindUncommonShares: FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses.GitHub

DumpShares

LogoGitHub - p0dalirius/DumpSMBShare: A python script to dump files and folders remotely from a Windows SMB share.GitHub

Manspider

LogoGitHub - blacklanternsecurity/MANSPIDER: Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!GitHub

Snaffler

Snaffler.exe -s -d inlanefreight.local -o snaffler.log -v data

NXC - CME

LogoSpidering Shares | NetExecwww.netexec.wiki
nxc SMB -u USER -p PASSWORD --spider C$ --pattern txt
nxc smb 10.10.10.10 -u 'user' -p 'pass' -M spider_plus

Resources

LogoNetwork shares | The Hacker Recipeswww.thehacker.recipes
PreviousSecurity ControlsNextRDWA

Last updated 16 days ago