Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/scanner/smb/smb_lookupsid.md
Views: 11784
The smb_lookupsid
module bruteforces the SID of the user, to obtain the username or group name. This module works against Windows and Samba. This module can also be used to lookup the information against a Domain utilizing the action
option. SID 500 is always the default administrator account, while user accounts start in the 1000 range.
Vulnerable Application
To use smb_lookupsid
, make sure you are able to connect to a SMB service that supports SMBv1.
Verification Steps
Do:
use auxiliary/scanner/smb/smb_lookupsid
Do:
set rhosts [IP]
Do:
run
Scenarios
Windows 2000 SP4
Metasploitable2 (Samba)
...snip...
Confirmation with nmap
NMAP utilizes smb-enum-users to do SID bruteforcing.
...snip...