πSMB Attacks
π― Overview
ποΈ SMB Attack Methodology
Attack Chain Overview
Service Discovery β Misconfiguration Analysis β Authentication Attacks β Privilege Escalation β Lateral MovementKey Attack Vectors
π Service Discovery & Enumeration
Basic SMB Scanning
Key Information to Extract
π Misconfiguration Attacks
1. Anonymous Authentication (Null Sessions)
File Share Enumeration
Permission Analysis
Directory Browsing
2. RPC Exploitation
Null Session RPC Access
Advanced RPC Operations
3. Automated Enumeration
βοΈ Protocol Specific Attacks
1. Brute Force & Password Spraying
Password Spraying with CrackMapExec
Best Practices
2. Metasploit SMB Login Scanner
π» Remote Code Execution
1. PsExec Family Tools
Impacket PsExec
Alternative Impacket Tools
2. CrackMapExec RCE
π·οΈ Credential Extraction & Lateral Movement
1. SAM Database Extraction
2. Pass-the-Hash (PtH) Attacks
3. Logged-on Users Enumeration
οΏ½οΏ½οΈ Forced Authentication Attacks
1. Responder - LLMNR/NBT-NS Poisoning
Setup Responder
Attack Scenario
Captured Credentials Example
2. Hash Cracking
3. NTLM Relay Attacks
Setup NTLM Relay
Advanced Relay with Commands
π Skills Assessment Examples
Example 1: Share Discovery
Example 2: Password Brute Force
Example 3: SSH Key Extraction
π‘οΈ Defense & Mitigation
SMB Security Hardening
Detection Strategies
π Related Techniques
π References
Last updated