![]() ![]() 192.168.1.160 - Pipes: \netlogon, \lsarpc, \samr, \browser, \atsvc, \DAV RPC SERVICE, \epmapper, \eventlog, \InitShutdown, \keysvc, \lsass, \ntsvcs, \protected_storage, \router, \scerpc, \srvsvc, \trkwks, \wkssvc 192.168.1.150 - Pipes: \netlogon, \lsarpc, \samr, \browser, \atsvc, \DAV RPC SERVICE, \epmapper, \eventlog, \InitShutdown, \keysvc, \lsass, \ntsvcs, \protected_storage, \scerpc, \srvsvc, \trkwks, \wkssvc Msf auxiliary( pipe_auditor) > set SMBUser Administrator msf auxiliary( pipe_auditor) > set SMBPass s3cr3t ![]() ![]() If, however, you have been provided with credentials as part of a pentest, you will find that the pipe_auditor scanner returns a great deal more information. We can see that running the scanner without credentials does not return a great deal of information. Msf auxiliary( pipe_auditor) > set THREADS 11 To run the scanner, just pass, at a minimum, the RHOSTS value to the module and run it. THREADS 1 yes The number of concurrent threads SMBUser no The username to authenticate as ![]() SMBPass no The password for the specified username SMBDomain WORKGROUP no The Windows domain to use for authentication RHOSTS yes The target address range or CIDR identifier Name Current Setting Required Description Msf auxiliary( pipe_auditor) > show options msf > use auxiliary/scanner/smb/pipe_auditor In your information gathering stage, this can provide you with some insight as to some of the services that are running on the remote system. The pipe_auditor scanner will determine what named pipes are available over SMB. Security Operations for Beginners (SOC-100).Exploit Development Prerequisites (EXP-100). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |