SMB
Null Session
smbmap:
Use the -R flag to recursively list everything.
smbclient:
Enter any password or supply the --no-pass
flag.
Pass The Hash
The NTLM hash of a user’s password is used in the NTLM challenge-response authentication protocol. Therefore, if you know the user’s NTLM hash, you can impersonate that user for services that rely on NTLM challenge-response.
Smbmap to enumerate an SMB share:
Note: If you just have the NT hash, then you can just input the NT hash twice. No one really checks the LM hash anyways.
Execute commands over SMB (requires write permissions):
NTLM Hash Theft
If you have access to a network share, then you can drop a file in there that will result in a user's NTLM hash being stolen when they navigate to that share.
TODO: Link main article in post exploitation
Last updated