1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-07-03 02:35:24 +02:00
tldr/pages/common/nxc-smb.md
2025-05-04 20:03:26 +03:00

1.3 KiB

nxc smb

Pentest and exploit SMB servers. More information: https://www.netexec.wiki/smb-protocol.

  • Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords:

nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}

  • Search for valid credentials for local accounts instead of domain accounts:

nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --local-auth

  • Enumerate SMB shares and the specified users' access rights to them on the target hosts:

nxc smb {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --shares

  • Enumerate network interfaces on the target hosts, performing authentication via pass-the-hash:

nxc smb {{192.168.178.30-45}} {{[-u|--username]}} {{username}} {{[-H|--hash]}} {{NTLM_hash}} --interfaces

  • Scan the target hosts for common vulnerabilities:

nxc smb {{path/to/target_list.txt}} {{[-u|--username]}} '' {{[-p|--password]}} '' {{[-M|--module]}} zerologon {{[-M|--module]}} petitpotam

  • Attempt to execute a command on the target hosts:

nxc smb {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}