NetBIOS and Null Session
Copy nmap -sS -p 135 <target> Probes NetBIOS info of machine:
Displays system shares information:
Copy nmblookup -A <target> Lists all shared shares of target:
Copy smbclient -L <target> Enumerates information on target Windows system (shares, users, etc):
Copy enum4linux -a <target> Attempts to access a shared resources with no credentials (null session):
Copy smbclient \\\\<target>\\<share> -N Attempt to connect to RPC service with no credentials:
Copy rpcclient -N -U "" <target> Attempts to bruteforce SMB credentials with nmap:
Copy nmap --script=smb-brute <target> SNMP Enumeration
Enumerates SNMP info of the given target:
Attempts to brute force SNMP community string:
Enumerate users:
Lists all SNMP-related nmap scripts:
Obtains SNMP info at specified OID:
Changes the SNMP information at specified OID:
Onesixtyone brute force:
Enumerate system processes:
Enumerate running programs:
Enumerate processes path:
Enumerate storage units:
Enumerate software name:
Enumerate user accounts:
Enumerate tcp local ports:
NFS Enumeration
Discover rpcbind:
Run Nmap scripts: