NFS Enumeration
Overview
NFS Versions
Version
Features
Default Configuration
NFS Configuration Options
Option
Description
Dangerous Settings
Option
Risk Level
Description
Enumeration Techniques
1. Port Scanning
2. RPC Information Gathering
3. NFS-Specific Enumeration
4. NFS Share Mounting
5. Content Analysis
Advanced Enumeration
Using Nmap NSE Scripts
Manual RPC Enumeration
Security Issues and Attack Vectors
1. Authentication Bypass
2. Privilege Escalation
3. Information Disclosure
4. File System Manipulation
Exploitation Examples
UID/GID Manipulation
SUID Binary Upload (when no_root_squash is set)
Enumeration Checklist
Initial Discovery
Share Analysis
Security Assessment
Defensive Measures
Secure Configuration
Best Practices
Monitoring
Cleanup
Last updated