SMB Pentesting Notes
Protocol Overview
Basic Information
Protocol Versions
Initial Enumeration
Port Scanning
Banner Grabbing
Anonymous/Guest Access
Testing Anonymous Access
Brute Force Attacks
Using Hydra
Using CrackMapExec
Using Metasploit
Common NSE Scripts
Share Operations
Listing Shares
Accessing Shares
RPC Enumeration
Using rpcclient
RID Cycling
Advanced Techniques
Pass-the-Hash
SMB Relay Attacks
Configuration Files
Samba Configuration
Windows Configuration
Common Vulnerabilities
Post-Exploitation
Information Gathering
Privilege Escalation
Common Status Codes
Code
Meaning