🟒Enumeration

NetBIOS and Null Session

nmap -sS -p 135 <target>

Probes NetBIOS info of machine:

nbtscan -v <target>

Displays system shares information:

nmblookup -A <target>

Lists all shared shares of target:

smbclient -L <target>

Enumerates information on target Windows system (shares, users, etc):

enum4linux -a <target>

Attempts to access a shared resources with no credentials (null session):

smbclient \\\\<target>\\<share> -N

Attempt to connect to RPC service with no credentials:

rpcclient -N -U "" <target>

Attempts to bruteforce SMB credentials with nmap:

nmap --script=smb-brute <target>

SNMP Enumeration

Enumerates SNMP info of the given target:

Attempts to brute force SNMP community string:

Enumerate users:

Lists all SNMP-related nmap scripts:

Obtains SNMP info at specified OID:

Changes the SNMP information at specified OID:

Onesixtyone brute force:

Enumerate system processes:

Enumerate running programs:

Enumerate processes path:

Enumerate storage units:

Enumerate software name:

Enumerate user accounts:

Enumerate tcp local ports:

SNMP and Metaespoit

NFS Enumeration

Discover rpcbind:

Run Nmap scripts:

Mount

Last updated

Was this helpful?