Network Shares Credential Hunting
π― Overview
Network shares credential hunting focuses on discovering credentials stored in shared network resources like SMB/CIFS shares, network drives, and file servers. Corporate environments heavily rely on network shares for file storage and team collaboration, making them valuable targets that often contain:
Configuration files with embedded credentials
Scripts and automation files containing hardcoded passwords
Documentation with password lists and access information
Backup files including system configs and databases
User personal files with saved credentials
Application data containing connection strings and API keys
"Network shares can unintentionally become a goldmine for attackers, especially when sensitive data like plaintext credentials or configuration files are left behind."
π§ Strategic Approach to Share Hunting
Target Assessment and Prioritization
# High-Value Shares (Priority 1)
IT$ # IT department shares
Admin$ # Administrative shares
C$ # System drives
SYSVOL # Domain policies and scripts
NETLOGON # Logon scripts
Backup # Backup repositories
# Medium-Value Shares (Priority 2)
Finance # Financial data and applications
HR # Human resources information
Development # Source code and configs
Infrastructure # Network and system configs
# Lower-Value Shares (Priority 3)
Marketing # Marketing materials
Sales # Sales documents
Public # General company filesCredential Pattern Recognition
Localization Considerations
πͺ Windows-Based Share Hunting
1. Snaffler - Automated Share Discovery
Installation and Basic Usage
Advanced Snaffler Options
Snaffler Output Interpretation
Example Snaffler Output Analysis
2. PowerHuntShares - HTML Report Generation
Installation and Setup
Basic PowerHuntShares Usage
PowerHuntShares Output Structure
HTML Report Analysis
3. Manual PowerShell Share Hunting
Basic PowerShell Commands
HTB Academy Domain-Specific Search Method
Advanced PowerShell Hunting
π§ Linux-Based Share Hunting
1. MANSPIDER - Docker-Based Share Scanner
Installation and Setup
Basic MANSPIDER Usage
Advanced MANSPIDER Options
MANSPIDER Output Analysis
2. NetExec Spider - Integrated Share Crawler
Basic NetExec Spider Usage
Advanced NetExec Spider Options
NetExec Spider Output Examples
3. Manual Linux Share Mounting and Analysis
SMB Share Mounting
Local Analysis of Mounted Shares
π― HTB Academy Lab Exercise
Lab Environment
Target: Domain-joined Windows system
Initial Access: RDP/WinRM with
mendres:Inlanefreight2025!Objective: Discover additional user credentials and domain admin password
Available Tools: Snaffler and PowerHuntShares in
C:\Users\Public
Lab Methodology
Phase 1: Share Enumeration and Access Verification
Phase 2: RDP Access and PowerShell Analysis
Phase 3: Automated Tool Analysis
Phase 4: Advanced Pattern Matching
Lab Questions Analysis
Question 1: Domain User Credentials
Objective: Find valid credentials of another domain user in mendres accessible shares
HTB Academy Methodology:
Alternative Search Methods:
Question 2: Domain Administrator Password
Objective: Use discovered user credentials to access additional shares and find domain admin password
HTB Academy Methodology:
Example File Contents (Onboarding_Docs_132.txt):
Alternative PowerShell Method:
Common Discovery Patterns
Pattern 1: Configuration Files with Embedded Credentials
Pattern 2: PowerShell Scripts with Hardcoded Credentials
Pattern 3: Documentation Files with Password Lists
π Share Hunting Best Practices
Pre-Engagement Preparation
Systematic Hunting Approach
Results Documentation
π‘οΈ Detection and Prevention
Share Security Hardening
Monitoring for Share Hunting
π‘ Key Takeaways
Share prioritization - Focus on high-value targets (IT, Admin, Backup shares)
Multi-tool approach - Combine automated tools with manual verification
Pattern recognition - Learn common credential storage patterns in corporate environments
Systematic methodology - Follow consistent search strategies across all accessible shares
Credential chaining - Use discovered credentials to access additional shares
Documentation focus - Look for IT documentation and configuration files
Temporal analysis - Recent files often contain current credentials
Cross-platform capability - Effective hunting from both Windows and Linux systems
This comprehensive guide covers network share credential hunting techniques using Snaffler, PowerHuntShares, MANSPIDER, and NetExec, based on HTB Academy's Password Attacks module.
Last updated