Closed Xyan1d3 closed 3 years ago
Thanks I will check :)
So, the server is not vulnerable to null session but anonymous authentication:
┌──(mpgn㉿kali)-[~/CrackMapExec]
└─$ poetry run crackmapexec smb 10.10.10.134 -u 'a' -p '' --shares
SMB 10.10.10.134 445 BASTION [*] Windows Server 2016 Standard 14393 x64 (name:BASTION) (domain:Bastion) (signing:False) (SMBv1:True)
SMB 10.10.10.134 445 BASTION [+] Bastion\a:
SMB 10.10.10.134 445 BASTION [+] Enumerated shares
SMB 10.10.10.134 445 BASTION Share Permissions Remark
SMB 10.10.10.134 445 BASTION ----- ----------- ------
SMB 10.10.10.134 445 BASTION ADMIN$ Remote Admin
SMB 10.10.10.134 445 BASTION Backups READ
SMB 10.10.10.134 445 BASTION C$ Default share
SMB 10.10.10.134 445 BASTION IPC$ Remote IPC
:)
Don't hesitate to re open the issue if needed :)
The
--shares
feature does not work consistently and bugs out 80% of the time.I have a habit of running
cme
everywhere I see an smb. When I runcrackmapexec smb 10.10.10.134 -u '' -p '' --shares
it spits out a lot of errors.It Should have listed me the shares and the access I have on the respective shares.
Crackmapexec info
The smbclient works as expected.