Network Shares Credential Hunting
π― Overview
π§ Strategic Approach to Share Hunting
Target Assessment and Prioritization
# High-Value Shares (Priority 1)
IT$ # IT department shares
Admin$ # Administrative shares
C$ # System drives
SYSVOL # Domain policies and scripts
NETLOGON # Logon scripts
Backup # Backup repositories
# Medium-Value Shares (Priority 2)
Finance # Financial data and applications
HR # Human resources information
Development # Source code and configs
Infrastructure # Network and system configs
# Lower-Value Shares (Priority 3)
Marketing # Marketing materials
Sales # Sales documents
Public # General company filesCredential Pattern Recognition
Localization Considerations
πͺ Windows-Based Share Hunting
1. Snaffler - Automated Share Discovery
Installation and Basic Usage
Advanced Snaffler Options
Snaffler Output Interpretation
Example Snaffler Output Analysis
2. PowerHuntShares - HTML Report Generation
Installation and Setup
Basic PowerHuntShares Usage
PowerHuntShares Output Structure
HTML Report Analysis
3. Manual PowerShell Share Hunting
Basic PowerShell Commands
HTB Academy Domain-Specific Search Method
Advanced PowerShell Hunting
π§ Linux-Based Share Hunting
1. MANSPIDER - Docker-Based Share Scanner
Installation and Setup
Basic MANSPIDER Usage
Advanced MANSPIDER Options
MANSPIDER Output Analysis
2. NetExec Spider - Integrated Share Crawler
Basic NetExec Spider Usage
Advanced NetExec Spider Options
NetExec Spider Output Examples
3. Manual Linux Share Mounting and Analysis
SMB Share Mounting
Local Analysis of Mounted Shares
π― HTB Academy Lab Exercise
Lab Environment
Lab Methodology
Phase 1: Share Enumeration and Access Verification
Phase 2: RDP Access and PowerShell Analysis
Phase 3: Automated Tool Analysis
Phase 4: Advanced Pattern Matching
Lab Questions Analysis
Question 1: Domain User Credentials
Question 2: Domain Administrator Password
Common Discovery Patterns
Pattern 1: Configuration Files with Embedded Credentials
Pattern 2: PowerShell Scripts with Hardcoded Credentials
Pattern 3: Documentation Files with Password Lists
π Share Hunting Best Practices
Pre-Engagement Preparation
Systematic Hunting Approach
Results Documentation
π‘οΈ Detection and Prevention
Share Security Hardening
Monitoring for Share Hunting
π‘ Key Takeaways
Last updated