SMB (445, 139) / RPC
Nmap
nmap 10.129.14.128 -sV -sC -p139,445nmap --script smb-os-discovery.nse -p445 10.10.10.40 nmap --script 'smb-vuln*' -Pn -p 139,445 {IP}nmap -A -p445 10.129.42.253Enumeration
Guest vs Null Session
Guest access

NXC - STATUS_NOT_SUPPORTED

List shares - Anonymously
SMBclient
SMBmap
CME / NXC
NetExec - CME
NetScan - From Windows Host
List shares - Guest account
Spider shares
Anonymous login
With RPC
Access share guest user
Download files
Download Folder
Upload files
Authenticated
List shares
Netexec - CME
NetExec - CMEsmbmap
Access share
SMBClient-ng

PowerHuntShares
Samba Status
RPC
RPCclient - Enumeration
Brute Forcing User RIDs
Bash
Impacket - Samrdump.py
Netexec - CME
Logged-on users
Check for Fake Potato or LeakedWallpaper
EnumerationImpersonate logged-on users

Enum4Linux
Anonymous
Authenticated
Metasploit
MetasploitNetexec - CME
NetExec - CMEPassword Spraying
Password SprayCME - NXC
Login equal password

Status of bruteforce

References
Sprayhound

References
STATUS_PASSWORD_MUST_CHANGE
Brute force
SMB BruteforceHydra
Metasploit
Usage
Windows
Mount share:
Credentials HuntingLinux
Credentials HuntingGet NTLMv2 Hashes
NTLM Relay - SMB Session Signing Disabled


No Signing
Ntlmrelayx
Hashes
Go-Secdump
NTLM Relay Gat
ShadowCoerce
DFSCoerce
Coercer
Coercion over DCOM - RemoteMonologue
Netexec
Kerberos relay over SMB
Network AttacksCVE-2025-33073 - NTLM Reflection
SAM & LSA secretsPSexec


Interactive Shell and Command Execution over Named-Pipes
Code Exec over RPC

Interesting Books
Interesting BooksSupport this Gitbook
Last updated

