SMB-Penetration-Testing-Guide
Table of Contents
Reconnaissance
Network Discovery
# Find hosts with SMB open
nmap -p 445 --open 192.168.1.0/24
# Quick SMB discovery
crackmapexec smb 192.168.1.0/24
# NetBIOS scan
nbtscan 192.168.1.0/24Port Scanning
Enumeration
Null Session Testing
Share Enumeration
User Enumeration
Password Policy Enumeration
Vulnerability Scanning
Check for Common Vulnerabilities
Check SMB Signing
Exploitation
EternalBlue (MS17-010)
Exploiting Writable Shares
PSExec-style Execution
Credential Attacks
Password Spraying
Capturing NTLM Hashes (Responder)
SMB Relay Attack
Pass-the-Hash
Hash Cracking
Post-Exploitation
File Exfiltration
Search for Sensitive Files
Lateral Movement
Persistence via SMB
Tool Reference
Essential Tools Installation
Quick Command Reference
Nmap NSE Scripts
Common Scenarios & Solutions
Scenario 1: Null Session Access
Scenario 2: Guest Account Access
Scenario 3: SMB Signing Disabled
Scenario 4: Writable Share Found
Reporting Findings
Critical Findings
Evidence Collection
Prevention & Hardening
Security Recommendations
Last updated