Windows Recon: SMB Nmap Scripts
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.
Objective: Your task is to fingerprint the service using the tools available on the Kali machine and run Nmap scripts to enumerate the Windows target machine's SMB service.
Identify SMB Protocol Dialects
Find SMB security level information
Enumerate active sessions, shares, Windows users, domains, services, etc.
The following username and password may be used to access the service:
Username
Password
administrator
smbserver_771
Tools
Nmap
Writeup
ping -c 1 demo.ine.local
nmap -p- -sSVC --min-rate 7000 -n -Pn demo.ine.local -vvv
Identify SMB Protocol Dialects & Security Level
nmap -p 445 --script smb-protocols demo.ine.local
Enumerate SMB Security Level (Encryption, Signing, etc.)
nmap -p 445 --script smb-security-mode demo.ine.local
Enumerate SMB Shares (Including Hidden Shares)
nmap -p 445 --script smb-enum-shares demo.ine.localnmap -p 445 --script smb-enum-shares --script-args smbusername=administrator,smbpassword=smbserver_771 demo.ine.local
Enumerate SMB Users & Domain Information
nmap -p 445 --script smb-enum-users --script-args smbusername=administrator,smbpassword=smbserver_771 demo.ine.local
Enumerate Active SMB Sessions
nmap -p 445 --script smb-enum-sessions demo.ine.localnmap -p 445 --script smb-enum-sessions --script-args smbusername=administrator,smbpassword=smbserver_771 demo.ine.local
Enumerate SMB Services & OS Version
nmap -p 445 --script smb-os-discovery demo.ine.local
Last updated