SMB
Server Message Block
$ sudo nmap -sV --script-args=unsafe=1 --script smb-os-discovery 10.10.13.37 -p139,445
$ sudo nmap -n -Pn -sV --script 'smb-vuln*' 10.10.13.37 -p445$ cme smb smb.txt | grep -a 'signing:False'Fingerprint
$ sudo ngrep -i -d eth0 's.?a.?m.?b.?a.*[[:digit:]]' port 139
$ echo exit | smbclient -N -L 10.10.13.37 --option='client min protocol=LANMAN1'Mounting
$ sudo mount -t cifs '//127.0.0.1/Users' /mnt/smb -v -o user=snovvcrash,[pass='Passw0rd!']$ mount -v | grep 'type cifs'
$ df -k -F cifsSMB Share with Null Authentication
Linux
Windows
Hunt for Shares & Content
Toy Example
Tools
rpcclient
smbclient(.py)
smbmap
Last updated