Windows Recon: SMB Nmap Scripts

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.

Objective: Your task is to fingerprint the service using the tools available on the Kali machine and run Nmap scripts to enumerate the Windows target machine's SMB service.

  1. Identify SMB Protocol Dialects

  2. Find SMB security level information

  3. Enumerate active sessions, shares, Windows users, domains, services, etc.

The following username and password may be used to access the service:

Username

Password

administrator

smbserver_771

Tools

  • Nmap

Writeup

ping -c 1 demo.ine.local

Identify SMB Protocol Dialects & Security Level

Enumerate SMB Security Level (Encryption, Signing, etc.)

Enumerate SMB Shares (Including Hidden Shares)

Enumerate SMB Users & Domain Information

Enumerate Active SMB Sessions

Enumerate SMB Services & OS Version

Last updated