π’Enumeration
NetBIOS and Null Session
nmap -sS -p 135 <target>Probes NetBIOS info of machine:
nbtscan -v <target>Displays system shares information:
nmblookup -A <target>Lists all shared shares of target:
smbclient -L <target>Enumerates information on target Windows system (shares, users, etc):
enum4linux -a <target>Attempts to access a shared resources with no credentials (null session):
smbclient \\\\<target>\\<share> -NAttempt to connect to RPC service with no credentials:
rpcclient -N -U "" <target>Attempts to bruteforce SMB credentials with nmap:
nmap --script=smb-brute <target>SNMP Enumeration
Enumerates SNMP info of the given target:
Attempts to brute force SNMP community string:
Enumerate users:
Lists all SNMP-related nmap scripts:
Obtains SNMP info at specified OID:
Changes the SNMP information at specified OID:
Onesixtyone brute force:
Enumerate system processes:
Enumerate running programs:
Enumerate processes path:
Enumerate storage units:
Enumerate software name:
Enumerate user accounts:
Enumerate tcp local ports:
SNMP and Metaespoit
NFS Enumeration
Discover rpcbind:
Run Nmap scripts:
Mount
Last updated
Was this helpful?