SMB Enumeration
The SMB enumeration feature allows users to perform brute-force attacks against SMB (Server Message Block) services. This can help in identifying weak credentials and gaining unauthorized access to shared resources.
With username and password file
This command allows you to perform SMB enumeration using a specific username and a list of passwords from a file. The tool will systematically attempt to authenticate using each password in the specified list, making it useful for security testing of SMB services.
python ./NexScan.py smb -T 127.0.0.1 -u username -P password_list.txt
With userfile and password
This command allows you to perform SMB enumeration by providing a list of usernames in a file and a single password. This method is useful when testing multiple potential usernames against a known or common password.
python ./NexScan.py smb -T 127.0.0.1 -U user_list.txt -p password
With userfile and password file
This command enables you to perform SMB enumeration using both a list of usernames and a list of passwords from separate files. This method provides the most comprehensive testing capability as it attempts all possible combinations of usernames and passwords. The tool will systematically work through both lists to attempt authentication for each username-password pair.
python ./NexScan.py smb -T 127.0.0.1 -U user_list.txt -P password_list.txt
Optional arguments for SMB brute-force:
- -T, --target: Specifies the target for the scan.
- -p, --password: Specify single password
- -P, --passwordfile: Specify password list file
- -u, --user: Specify target username
- -U, --userfile: Specify file containing list of usernames
- -s, --stop: Stop on first successful login
- -v, --verbose: Enable verbose output
- -port: Specify target port (by default 445)