In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.
Objective: Your task is to fingerprint the service using the tools available on the Kali machine and run Nmap scripts to enumerate the Windows target machine's SMB service.
Identify SMB Protocol Dialects
Find SMB security level information
Enumerate active sessions, shares, Windows users, domains, services, etc.
The following username and password may be used to access the service: