SMB-Penetration-Testing-Guide

Table of Contents


Reconnaissance

Network Discovery

# Find hosts with SMB open
nmap -p 445 --open 192.168.1.0/24

# Quick SMB discovery
crackmapexec smb 192.168.1.0/24

# NetBIOS scan
nbtscan 192.168.1.0/24

Port Scanning

Key Information to Gather:

  • SMB version (v1, v2, v3)

  • OS version

  • Hostname/Domain

  • SMB signing status

  • Message signing required/not required


Enumeration

Null Session Testing

Share Enumeration

User Enumeration

Password Policy Enumeration

Key Info from Password Policy:

  • Minimum password length

  • Password complexity requirements

  • Account lockout threshold

  • Lockout duration

  • Password history


Vulnerability Scanning

Check for Common Vulnerabilities

Check SMB Signing

Why SMB Signing Matters:

  • If disabled → SMB Relay attacks possible

  • If not required → MITM attacks possible

  • If enforced → More secure but relay still possible in some scenarios


Exploitation

EternalBlue (MS17-010)

Exploiting Writable Shares

PSExec-style Execution


Credential Attacks

Password Spraying

Best Practices for Password Spraying:

  • Use common passwords: Password123, Welcome1, CompanyName2024

  • Spray slowly to avoid account lockouts

  • Check password policy first

  • Use 1 password against all users, not all passwords against 1 user

Capturing NTLM Hashes (Responder)

SMB Relay Attack

Pass-the-Hash

Hash Cracking


Post-Exploitation

File Exfiltration

Search for Sensitive Files

Lateral Movement

Persistence via SMB


Tool Reference

Essential Tools Installation

Quick Command Reference

smbclient:

smbmap:

crackmapexec:

rpcclient:

enum4linux:

Nmap NSE Scripts


Common Scenarios & Solutions

Scenario 1: Null Session Access

Scenario 2: Guest Account Access

Scenario 3: SMB Signing Disabled

Scenario 4: Writable Share Found


Reporting Findings

Critical Findings

  • Null Session Access → Allows unauthenticated enumeration

  • Guest Account Enabled → Anonymous access to shares

  • SMB Signing Disabled → SMB relay attacks possible

  • SMBv1 Enabled → Vulnerable to EternalBlue (MS17-010)

  • Weak Passwords → Password spraying successful

  • Writable Shares → Code execution possible

Evidence Collection


Prevention & Hardening

Security Recommendations

  1. Disable SMBv1 - Always use SMBv2 or SMBv3

  2. Enable SMB Signing - Require message signing

  3. Disable Null Sessions - RestrictAnonymous = 2

  4. Disable Guest Account - No anonymous access

  5. Strong Password Policy - Complex passwords, no default creds

  6. Restrict Share Permissions - Least privilege principle

  7. Network Segmentation - Limit SMB traffic with firewall rules

  8. Patch Management - Keep systems updated (MS17-010, etc.)

  9. Monitor SMB Logs - Detect suspicious activity

  10. Use Account Lockout - Prevent brute force (but avoid DoS)


Last Updated: November 2025 Target Audience: Penetration Testers & Security Professionals Disclaimer: Use only in authorized engagements. Unauthorized access is illegal.

Last updated