Skip to main content

SMB Enumeration

The SMB enumeration feature allows users to perform brute-force attacks against SMB (Server Message Block) services. This can help in identifying weak credentials and gaining unauthorized access to shared resources.

With username and password file

This command attempts SSH authentication using a specified username and a list of passwords from a file. The tool will systematically try each password in the list until a successful authentication is found or the list is exhausted. This method is particularly useful when testing against a known username.

./NexScan.py smb -T 127.0.0.1 -u kali -P password_list.txt

With userfile and password

This command allows you to test multiple usernames from a file against a single specified password. This approach is useful when you have a list of potential usernames and want to check them against a known or commonly used password. The usernames are read sequentially from the specified file, and each is tested with the provided password.

./NexScan.py smb -T 127.0.0.1 -U user_list.txt -p kali

With userfile and password file

This command performs the most comprehensive SSH brute-force attempt by using both a list of usernames and a list of passwords from separate files. The tool will systematically test each username-password combination, making it an effective method for thorough security testing. However, use this option carefully as it may generate significant network traffic and could trigger security alerts.

./NexScan.py smb -T 127.0.0.1 -U user_list.txt -P password_list.txt

Optional arguments for SMB brute-force:

  • -T, --target: Specifies the target for the scan.
  • -p, --password: Specify single password
  • -P, --passwordfile: Specify password list file
  • -u, --user: Specify target username
  • -U, --userfile: Specify file containing list of usernames
  • -s, --stop: Stop on first successful login
  • -v, --verbose: Enable verbose output
  • -port: Specify target port (by default 445)