📕
The Red Book
  • 📕The Red Book
  • 🦳Stages of Ethical Hacking
    • 1️⃣Information Gathering
      • Active Information Gathering
        • DNS Zone Transfers
        • NMAP
        • netdiscover
        • sqlMap
        • Nikto
        • Shodan
        • RustScan
        • Amass
        • fping
      • Passive Information Gathering
        • Website Recon & Footprinting
        • Whois Enumeration
        • Netcraft
        • ⭐DNS
        • Identify if site is protected by firewall or proxy - wafw00f
        • Subdomain Enumeration - Sublist3r
        • ❌theHarvester (borked)
        • Email gathering
        • Leaked Password Databases
        • Certificates
    • 2️⃣Enumeration
      • SMB
        • Windows discover & Mount
        • NMAP Scripts
        • SMBMap
        • Samba with Linux
        • Dictionary Attack
      • FTP
      • SSH
      • HTTP
        • Subdomain
        • IIS
        • Apache
      • SQL
    • 3️⃣Vulnerability Assessment
      • Nessus
  • 💾System/Host Based Attacks
    • 🪟Windows
      • Frequently exploited Windows Services
    • 🐧Linux
  • 🥽Dorks
    • Google
      • Cheatsheet
      • Examples
    • Extra
  • 🎣Phishing
    • Gophish
    • evilgophish
    • King Phisher
    • EvilURL
  • 🔎OSINT
    • Temporary links
  • 👾Data exfiltration
    • Temporary links
  • 🐝OWASP
    • Top10
  • 📙Cheat Sheet
    • Curl
Powered by GitBook
On this page
Edit on GitHub
  1. Stages of Ethical Hacking
  2. Enumeration
  3. SMB

NMAP Scripts

PreviousWindows discover & MountNextSMBMap

Last updated 2 years ago

  • Script list

nmap -p445 --script smb-protocols $IP

nmap -p445 --script smb-security-mode $IP

nmap -p445 --script smb-enum-sessions $IP

nmap -p445 --script smb-enum-sessions --script-args smbusername=administrator,smbpassword=smbserver_111 $IP

nmap -p445 --script smb-enum-shares $IP

nmap -p445 --script smb-enum-shares --script-args smbusername=administrator,smbpassword=smbserver_111 $IP

nmap -p445 --script smb-enum-users --script-args smbusername=administrator,smbpassword=smbserver_111 $IP

nmap -p445 --script smb-server-stats --script-args smbusername=administrator,smbpassword=smbserver_111 $IP

nmap -p445 --script smb-enum-domains --script-args smbusername=administrator,smbpassword=smbserver_111 $IP

nmap -p445 --script smb-enum-groups --script-args smbusername=administrator,smbpassword=smbserver_111 $IP

nmap -p445 --script smb-enum-services  --script-args smbusername=administrator,smbpassword=smbserver_111 $IP

nmap -p445 --script smb-enum-shares,smb-ls  --script-args smbusername=administrator,smbpassword=smbserver_111 $IP

The IPC$ share is also known as a null session connection. By using this session, Windows lets anonymous users perform certain activities, such as enumerating the names of domain accounts and network shares.

The IPC$ share is created by the Windows Server service. This special share exists to allow for subsequent named pipe connections to the server. The server's named pipes are created by built-in operating system components and by any applications or services that are installed on the system. When the named pipe is being created, the process specifies the security that is associated with the pipe, and then makes sure that access is only granted to the specified users or groups

🦳
2️⃣
⭐
Scripts Link
Lib Link