<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Forensic%3A_msfconsole_use_auxiliary%2Fscanner%2Fsmb%2Fsmb_enumshares_attack_%28en%29</id>
	<title>Forensic: msfconsole use auxiliary/scanner/smb/smb enumshares attack (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Forensic%3A_msfconsole_use_auxiliary%2Fscanner%2Fsmb%2Fsmb_enumshares_attack_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_msfconsole_use_auxiliary/scanner/smb/smb_enumshares_attack_(en)&amp;action=history"/>
	<updated>2026-04-26T01:02:42Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_msfconsole_use_auxiliary/scanner/smb/smb_enumshares_attack_(en)&amp;diff=70971&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;==What is `msfconsole use auxiliary/scanner/smb/smb_enumshares`?==  This command is one of the modules in the Metasploit Framework used for enumeration or reconnaissance of th...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_msfconsole_use_auxiliary/scanner/smb/smb_enumshares_attack_(en)&amp;diff=70971&amp;oldid=prev"/>
		<updated>2024-10-19T22:26:46Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==What is `msfconsole use auxiliary/scanner/smb/smb_enumshares`?==  This command is one of the modules in the Metasploit Framework used for enumeration or reconnaissance of th...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==What is `msfconsole use auxiliary/scanner/smb/smb_enumshares`?==&lt;br /&gt;
&lt;br /&gt;
This command is one of the modules in the Metasploit Framework used for enumeration or reconnaissance of the Server Message Block (SMB) service on a system. SMB is a network protocol commonly used for sharing files and printers in Windows networks. By using this module, an attacker can identify:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Available Shares:&amp;#039;&amp;#039;&amp;#039; This module will display a list of shares published by the target, such as shares for folders, printers, etc.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Access Rights:&amp;#039;&amp;#039;&amp;#039; Sometimes, this module can also provide information about access rights (read, write, execute) for those shares.&lt;br /&gt;
&lt;br /&gt;
This information is very valuable for attackers as it can serve as a starting point for further attacks, such as:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Finding Sensitive Files:&amp;#039;&amp;#039;&amp;#039; If there are shares containing important files, the attacker may try to access them.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Finding Vulnerabilities:&amp;#039;&amp;#039;&amp;#039; Information about shares and access rights can be used to look for vulnerabilities that can be exploited.&lt;br /&gt;
&lt;br /&gt;
==Example Attack==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Objective:&amp;#039;&amp;#039;&amp;#039; Identify shares on an Ubuntu 24.04 server running the SMB service.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Steps:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
1. &amp;#039;&amp;#039;&amp;#039;Open Metasploit:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 msfconsole&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. &amp;#039;&amp;#039;&amp;#039;Select the module:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 use auxiliary/scanner/smb/smb_enumshares&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. &amp;#039;&amp;#039;&amp;#039;Set the target:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 set RHOSTS &amp;lt;target_IP_address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Replace `&amp;lt;target_IP_address&amp;gt;` with the target server&amp;#039;s IP address.&lt;br /&gt;
&lt;br /&gt;
4. &amp;#039;&amp;#039;&amp;#039;Run the scan:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 run&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Results:&amp;#039;&amp;#039;&amp;#039; If successful, Metasploit will display a list of found shares along with additional information such as share name, type, and comments.&lt;br /&gt;
&lt;br /&gt;
==Attack Forensics==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Objective:&amp;#039;&amp;#039;&amp;#039; Find evidence of an attack using the `smb_enumshares` module.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Steps:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
1. &amp;#039;&amp;#039;&amp;#039;Log Analysis:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Metasploit Logs:&amp;#039;&amp;#039;&amp;#039; Check the Metasploit logs for suspicious activity, such as the use of the `smb_enumshares` module and the targeted hosts.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Target System Logs:&amp;#039;&amp;#039;&amp;#039; Look for log entries related to the SMB service, such as unauthorized access to specific shares.&lt;br /&gt;
&lt;br /&gt;
2. &amp;#039;&amp;#039;&amp;#039;Network Traffic Analysis:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Capture Network Traffic:&amp;#039;&amp;#039;&amp;#039; Use tools like Wireshark to capture network traffic occurring during the attack.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Filter Traffic:&amp;#039;&amp;#039;&amp;#039; Filter the traffic based on the SMB protocol and the ports used (139 and 445).&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Search for SMB Packets:&amp;#039;&amp;#039;&amp;#039; Look for SMB packets containing requests for share enumeration.&lt;br /&gt;
&lt;br /&gt;
3. &amp;#039;&amp;#039;&amp;#039;File Analysis:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Look for Log Files:&amp;#039;&amp;#039;&amp;#039; Search for log files related to the SMB service to identify suspicious activity.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;System File Analysis:&amp;#039;&amp;#039;&amp;#039; Check system files to see if there are any files or directories accessed without authorization.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Evidence that can be found:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Metasploit Logs:&amp;#039;&amp;#039;&amp;#039; Records of the use of the `smb_enumshares` module.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;System Logs:&amp;#039;&amp;#039;&amp;#039; Records of unauthorized access to SMB shares.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Network Capture:&amp;#039;&amp;#039;&amp;#039; SMB packets containing requests for share enumeration.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Log Files:&amp;#039;&amp;#039;&amp;#039; Records of suspicious activity in the SMB service.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Update the System:&amp;#039;&amp;#039;&amp;#039; Ensure the system is always updated with the latest security patches.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Limit Access:&amp;#039;&amp;#039;&amp;#039; Restrict access to the SMB service only to authorized users.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Use a Firewall:&amp;#039;&amp;#039;&amp;#039; Configure the firewall to block unauthorized access to SMB ports.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Monitor Logs:&amp;#039;&amp;#039;&amp;#039; Regularly monitor system logs and application logs for suspicious activity.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Implement IDS/IPS:&amp;#039;&amp;#039;&amp;#039; Use an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) to detect and prevent attacks.&lt;br /&gt;
&lt;br /&gt;
==Important to Remember:==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Legality:&amp;#039;&amp;#039;&amp;#039; The use of tools like Metasploit should be done with appropriate permissions and only for educational or security testing purposes.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Ethics:&amp;#039;&amp;#039;&amp;#039; Do not conduct attacks on systems for which you do not have permission.&lt;br /&gt;
&lt;br /&gt;
By understanding how these attacks work and the forensic steps that can be taken, you can better protect your systems from similar threats.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [[Forensic: IT]]&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>