Port 139, 445 - SMB
Scanning:
nmap --script "smb-vuln*" -p 139.445 -Pn $targetnmap -v -p 139,445 -oG smb.txt 10.11.1.1-254nmap 10.11.1.220 --script=smb-os-discoverynbtscan -r 10.11.1.0/24
Enumerate Users
enum4linux -A $IPAccepts creds as arguments
Test For Access Level
crackmapexec smb $target -u guest -p "" --sharesSpider Shares [with Pattern]
crackmapexec smb $target -u 'username' -p 'password' --spider sharename\ --pattern txtSpider_Plus
Lists all files and saves as json
crackmapexec smb $target -u 'username' -p 'password' -M spider_plus
Download Everything
smbmap -H $IP -R -A .Use -exclude flag for shares you don't need
Use -depth flag if you don't need everything in a folder
Mount Share
mount -t cifs //$IP/share /mnt/sharemount -t cifs -o username=$user //$IP/share /mnt/shareRPCClient
rpcclient -U "" $IP
Eternalblue Manual Compilation: https://root4loot.com/post/eternalblue_manual_exploit/
Last updated