# nxc smb > Pentest and exploit SMB servers. > More information: . - Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords: `nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` - Search for valid credentials for local accounts instead of domain accounts: `nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --local-auth` - Enumerate SMB shares and the specified users' access rights to them on the target hosts: `nxc smb {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --shares` - Enumerate network interfaces on the target hosts, performing authentication via pass-the-hash: `nxc smb {{192.168.178.30-45}} {{[-u|--username]}} {{username}} {{[-H|--hash]}} {{NTLM_hash}} --interfaces` - Scan the target hosts for common vulnerabilities: `nxc smb {{path/to/target_list.txt}} {{[-u|--username]}} '' {{[-p|--password]}} '' {{[-M|--module]}} zerologon {{[-M|--module]}} petitpotam` - Attempt to execute a command on the target hosts: `nxc smb {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}`