smb-ejpt-lab
Lab 1 — nmap SMB enumeration (guest + authenticated)
1
2
Enumerate the same sessions using provided credentials
nmap -p445 --script smb-enum-sessions --script-args smbusername=administrator,smbpassword=smbserver_771 10.2.24.25Host script results:
| smb-enum-sessions:
| Users logged in
| WIN-OMCNBKR66MN\bob since 2023-02-13T20:37:26
| Active SMB sessions
|_ ADMINISTRATOR is connected from \\10.10.24.4 for [just logged in, it's probably you], idle for [not idle]3
Enumerate SMB shares as guest
nmap -p445 --script smb-enum-shares 10.2.24.25Host script results:
| smb-enum-shares:
| account_used: guest
| \\10.2.24.25\ADMIN$:
| Type: STYPE_DISKTREE_HIDDEN
| Comment: Remote Admin
| Anonymous access: <none>
| Current user access: <none>
| \\10.2.24.25\C:
| Type: STYPE_DISKTREE
| Comment:
| Anonymous access: <none>
| Current user access: READ
| \\10.2.24.25\C$:
| Type: STYPE_DISKTREE_HIDDEN
| Comment: Default share
| Anonymous access: <none>
| Current user access: <none>
| \\10.2.24.25\D$:
| Type: STYPE_DISKTREE_HIDDEN
| Comment: Default share
| Anonymous access: <none>
| Current user access: <none>
| \\10.2.24.25\Documents:
| Type: STYPE_DISKTREE
| Comment:
| Anonymous access: <none>
| Current user access: READ
| \\10.2.24.25\Downloads:
| Type: STYPE_DISKTREE
| Comment:
| Anonymous access: <none>
| Current user access: READ
| \\10.2.24.25\IPC$:
| Type: STYPE_IPC_HIDDEN
| Comment: Remote IPC
| Anonymous access: <none>
| Current user access: READ/WRITE
| \\10.2.24.25\print$:
| Type: STYPE_DISKTREE
| Comment: Printer Drivers
| Anonymous access: <none>
|_ Current user access: READ4
Enumerate SMB shares with authenticated user (administrator)
nmap -p445 --script smb-enum-shares --script-args smbusername=administrator,smbpassword=smbserver_771 10.2.24.25Host script results:
| smb-enum-shares:
| account_used: administrator
| \\10.2.24.25\ADMIN$:
| Type: STYPE_DISKTREE_HIDDEN
| Comment: Remote Admin
| Users: 0
| Max Users: <unlimited>
| Path: C:\Windows
| Anonymous access: <none>
| Current user access: READ/WRITE
[...]
|_ Current user access: READ/WRITE5
Enumerate Windows users
nmap -p445 --script smb-enum-users --script-args smbusername=administrator,smbpassword=smbserver_771 10.2.24.25Host script results:
| smb-enum-users:
| WIN-OMCNBKR66MN\Administrator (RID: 500)
| Description: Built-in account for administering the computer/domain
| Flags: Password does not expire, Normal user account
| WIN-OMCNBKR66MN\bob (RID: 1010)
| Flags: Password does not expire, Normal user account
| WIN-OMCNBKR66MN\Guest (RID: 501)
| Description: Built-in account for guest access to the computer/domain
|_ Flags: Password does not expire, Password not required, Normal user account6
Server statistics
nmap -p445 --script smb-server-stats --script-args smbusername=administrator,smbpassword=smbserver_771 10.2.24.25Host script results:
| smb-server-stats:
| Server statistics collected since 2023-02-13T20:37:19 (40m18s):
| 94675 bytes (39.15 b/s) sent, 80383 bytes (33.24 b/s) received
|_ 34 failed logins, 7 permission errors, 0 system errors, 0 print jobs, 35 files opened7
Enumerate domains and policies
nmap -p445 --script smb-enum-domains--script-args smbusername=administrator,smbpassword=smbserver_771 10.2.24.25Host script results:
| smb-enum-domains:
| WIN-OMCNBKR66MN
| Groups: WinRMRemoteWMIUsers__
| Users: Administrator, bob, Guest
| Creation time: 2013-08-22T14:47:57
| Passwords: min length: n/a; min age: n/a days; max age: 42 days; history: n/a passwords
| Properties: Complexity requirements exist # Important
| Account lockout disabled
[...]
|_ Account lockout disabled8
Enumerate groups
nmap -p445 --script smb-enum-groups--script-args smbusername=administrator,smbpassword=smbserver_771 10.2.24.25Host script results:
| smb-enum-groups:
| Builtin\Administrators (RID: 544): Administrator, bob
| Builtin\Users (RID: 545): bob
| Builtin\Guests (RID: 546): Guest
[...]
|_ WIN-OMCNBKR66MN\WinRMRemoteWMIUsers__ (RID: 1000): <empty>9
Enumerate services
nmap -p445 --script smb-enum-services --script-args smbusername=administrator,smbpassword=smbserver_771 10.2.24.25PORT STATE SERVICE
445/tcp open microsoft-ds
| smb-enum-services:
| AmazonSSMAgent:
| display_name: Amazon SSM Agent
| state:
| SERVICE_RUNNING
| SERVICE_PAUSED
[...]
| TrustedInstaller:
| display_name: Windows Modules Installer
| state:
| SERVICE_RUNNING
[...]
| vds:
| display_name: Virtual Disk
| state:
| SERVICE_RUNNING
|_ SERVICE_CONTROL_STOP10
List files on all shared folders (smb-ls)
nmap -p445 --script smb-enum-shares,smb-ls --script-args smbusername=administrator,smbpassword=smbserver_771 10.2.24.25| smb-ls: Volume \\10.2.24.25\ADMIN$
| maxfiles limit reached (10)
| SIZE TIME FILENAME
| <DIR> 2013-08-22T13:36:16 .
| <DIR> 2013-08-22T13:36:16 ..
| <DIR> 2013-08-22T15:39:31 ADFS
[...]
| Volume \\10.2.24.25\C
| maxfiles limit reached (10)
| SIZE TIME FILENAME
| <DIR> 2013-08-22T15:39:30 PerfLogs
| <DIR> 2013-08-22T13:36:16 Program Files
[...]
| Volume \\10.2.24.25\print$
| maxfiles limit reached (10)
| SIZE TIME FILENAME
| <DIR> 2013-08-22T15:39:31 .
| <DIR> 2013-08-22T15:39:31 ..
| <DIR> 2013-08-22T15:39:31 color
| 1058 2013-08-22T06:54:44 color\D50.camp
|_Lab 2 — Windows Recon: SMBMap (target 10.2.21.233)
1
2
3
Enumerate with smbmap as guest
smbmap -u guest -p "" -d . -H 10.2.21.233[+] Guest session IP: 10.2.21.233:445 Name: 10.2.21.233
Disk Permissions Comment
---- ----------- -------
ADMIN$ NO ACCESS Remote Admin
C NO ACCESS
C$ NO ACCESS Default share
D$ NO ACCESS Default share
Documents NO ACCESS
Downloads NO ACCESS
IPC$ READ ONLY Remote IPC
print$ READ ONLY Printer Drivers4
5
List drives and directories, upload/download files
smbmap -u administrator -p 'smbserver_771' -H 10.2.21.233 -Lsmbmap -u administrator -p 'smbserver_771' -H 10.2.21.233 -r 'C$'touch sample_backdoor
smbmap -u administrator -p 'smbserver_771' -H 10.2.21.233 --upload '/root/sample_backdoor' 'C$\sample_backdoor'smbmap -u administrator -p 'smbserver_771' -H 10.2.21.233 --download 'C$\flag.txt'cat 10.2.21.233-C_flag.txt25f492dbef8453cdca69a173a75790f0Lab 3 — Samba Recon: Basics 1 (target 192.28.157.3)
1
2
3
4
5
6
7
Lab 4 — Samba Recon: Basics 2 (target 192.230.128.3)
1
4
5
Lab 5 — Samba Recon: Basics 3 (target 192.187.39.3)
1
2
Lab 6 — Samba Recon: Dictionary Attack (target 192.174.58.3)
Last updated