<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Forensic%3A_nmap_smb-enum-users.nse_attack_%28en%29</id>
	<title>Forensic: nmap smb-enum-users.nse attack (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Forensic%3A_nmap_smb-enum-users.nse_attack_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_nmap_smb-enum-users.nse_attack_(en)&amp;action=history"/>
	<updated>2026-04-20T18:14:56Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_nmap_smb-enum-users.nse_attack_(en)&amp;diff=71302&amp;oldid=prev</id>
		<title>Unknown user: /* Example Attack */</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_nmap_smb-enum-users.nse_attack_(en)&amp;diff=71302&amp;oldid=prev"/>
		<updated>2024-12-04T11:46:05Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Example Attack&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 11:46, 4 December 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l7&quot;&gt;Line 7:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 7:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Suppose we want to enumerate users on a Windows server named &amp;quot;server-windows&amp;quot; that can be accessed from our network. We can run the following Nmap commands:&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Suppose we want to enumerate users on a Windows server named &amp;quot;server-windows&amp;quot; that can be accessed from our network. We can run the following Nmap commands:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; wget https://svn.nmap.org/nmap/scripts/smb-enum-users.nse&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  nmap -sV --script smb-enum-users.nse server-windows&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  nmap -sV --script smb-enum-users.nse server-windows&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_nmap_smb-enum-users.nse_attack_(en)&amp;diff=71123&amp;oldid=prev</id>
		<title>Unknown user: /* Attack Forensics */</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_nmap_smb-enum-users.nse_attack_(en)&amp;diff=71123&amp;oldid=prev"/>
		<updated>2024-10-28T04:59:49Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Attack Forensics&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 04:59, 28 October 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l25&quot;&gt;Line 25:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 25:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;If we find evidence of an attack using smb-enum-users.nse, some artifacts we can look for include:&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;If we find evidence of an attack using smb-enum-users.nse, some artifacts we can look for include:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;1. &lt;/del&gt;&#039;&#039;&#039;Nmap Logs:&#039;&#039;&#039; If the attacker ran Nmap from an accessible system, we can check Nmap logs to find the commands used.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# &lt;/ins&gt;&#039;&#039;&#039;Nmap Logs:&#039;&#039;&#039; If the attacker ran Nmap from an accessible system, we can check Nmap logs to find the commands used.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2. &lt;/del&gt;&#039;&#039;&#039;System Logs:&#039;&#039;&#039; Examine the logs on the target Windows server for suspicious activity, such as failed login attempts or unusual network activity.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# &lt;/ins&gt;&#039;&#039;&#039;System Logs:&#039;&#039;&#039; Examine the logs on the target Windows server for suspicious activity, such as failed login attempts or unusual network activity.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;3. &lt;/del&gt;&#039;&#039;&#039;Firewall Logs:&#039;&#039;&#039; If there’s a firewall protecting the server, check the firewall logs for suspicious traffic from the attacker’s IP address.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# &lt;/ins&gt;&#039;&#039;&#039;Firewall Logs:&#039;&#039;&#039; If there’s a firewall protecting the server, check the firewall logs for suspicious traffic from the attacker’s IP address.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;4. &lt;/del&gt;&#039;&#039;&#039;Network Traffic Capture:&#039;&#039;&#039; If we have captured network traffic, we can analyze it for packets related to the smb-enum-users.nse attack.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# &lt;/ins&gt;&#039;&#039;&#039;Network Traffic Capture:&#039;&#039;&#039; If we have captured network traffic, we can analyze it for packets related to the smb-enum-users.nse attack.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;5. &lt;/del&gt;&#039;&#039;&#039;Windows Event Logs:&#039;&#039;&#039; Check the event log on the Windows server for entries related to user enumeration attempts.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# &lt;/ins&gt;&#039;&#039;&#039;Windows Event Logs:&#039;&#039;&#039; Check the event log on the Windows server for entries related to user enumeration attempts.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Mitigation==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Mitigation==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_nmap_smb-enum-users.nse_attack_(en)&amp;diff=70944&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;&#039;&#039;&#039;Nmap smb-enum-users.nse&#039;&#039;&#039; is a script used to enumerate users on Windows systems with active SMB (Server Message Block) services. This script employs two main methods:  *...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic:_nmap_smb-enum-users.nse_attack_(en)&amp;diff=70944&amp;oldid=prev"/>
		<updated>2024-10-19T02:25:16Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Nmap smb-enum-users.nse&amp;#039;&amp;#039;&amp;#039; is a script used to enumerate users on Windows systems with active SMB (Server Message Block) services. This script employs two main methods:  *...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Nmap smb-enum-users.nse&amp;#039;&amp;#039;&amp;#039; is a script used to enumerate users on Windows systems with active SMB (Server Message Block) services. This script employs two main methods:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;SAMR enumeration:&amp;#039;&amp;#039;&amp;#039; This method is subtler and requires fewer packets for each user account. However, the information obtained may not be as complete as that from the LSA method.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;LSA bruteforcing:&amp;#039;&amp;#039;&amp;#039; This method is noisier, generating more network traffic and log entries. However, it can provide more comprehensive information about user accounts.&lt;br /&gt;
&lt;br /&gt;
==Example Attack==&lt;br /&gt;
&lt;br /&gt;
Suppose we want to enumerate users on a Windows server named &amp;quot;server-windows&amp;quot; that can be accessed from our network. We can run the following Nmap commands:&lt;br /&gt;
&lt;br /&gt;
 nmap -sV --script smb-enum-users.nse server-windows&lt;br /&gt;
 nmap --script smb-enum-users.nse -p445 &amp;lt;host&amp;gt;&lt;br /&gt;
 sudo nmap -sU -sS --script smb-enum-users.nse -p U:137,T:139 &amp;lt;host&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Options used:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* `-sV`: Performs version scanning to obtain service version information.&lt;br /&gt;
* `--script smb-enum-users.nse`: Runs the smb-enum-users.nse script.&lt;br /&gt;
&lt;br /&gt;
==Expected Results==&lt;br /&gt;
&lt;br /&gt;
The output from the above commands will display a list of users found on the Windows server, including usernames, SIDs (Security Identifiers), and other information.&lt;br /&gt;
&lt;br /&gt;
==Attack Forensics==&lt;br /&gt;
&lt;br /&gt;
If we find evidence of an attack using smb-enum-users.nse, some artifacts we can look for include:&lt;br /&gt;
&lt;br /&gt;
1. &amp;#039;&amp;#039;&amp;#039;Nmap Logs:&amp;#039;&amp;#039;&amp;#039; If the attacker ran Nmap from an accessible system, we can check Nmap logs to find the commands used.&lt;br /&gt;
2. &amp;#039;&amp;#039;&amp;#039;System Logs:&amp;#039;&amp;#039;&amp;#039; Examine the logs on the target Windows server for suspicious activity, such as failed login attempts or unusual network activity.&lt;br /&gt;
3. &amp;#039;&amp;#039;&amp;#039;Firewall Logs:&amp;#039;&amp;#039;&amp;#039; If there’s a firewall protecting the server, check the firewall logs for suspicious traffic from the attacker’s IP address.&lt;br /&gt;
4. &amp;#039;&amp;#039;&amp;#039;Network Traffic Capture:&amp;#039;&amp;#039;&amp;#039; If we have captured network traffic, we can analyze it for packets related to the smb-enum-users.nse attack.&lt;br /&gt;
5. &amp;#039;&amp;#039;&amp;#039;Windows Event Logs:&amp;#039;&amp;#039;&amp;#039; Check the event log on the Windows server for entries related to user enumeration attempts.&lt;br /&gt;
&lt;br /&gt;
==Mitigation==&lt;br /&gt;
&lt;br /&gt;
To prevent smb-enum-users.nse attacks, several measures can be taken:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Disable Unnecessary SMB:&amp;#039;&amp;#039;&amp;#039; If SMB is not needed, disable the SMB service on the server.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Restrict Network Access:&amp;#039;&amp;#039;&amp;#039; Limit network access to the server to authorized users only.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Use a Firewall:&amp;#039;&amp;#039;&amp;#039; Configure the firewall to block unauthorized traffic.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Update Operating Systems and Applications:&amp;#039;&amp;#039;&amp;#039; Ensure that the operating system and applications are always updated with the latest security patches.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Use Strong Passwords:&amp;#039;&amp;#039;&amp;#039; Enforce users to use strong and unique passwords for each account.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Enable Audit Logging:&amp;#039;&amp;#039;&amp;#039; Activate audit logging features to track user and system activity.&lt;br /&gt;
&lt;br /&gt;
==Important to Remember==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Educational Purpose:&amp;#039;&amp;#039;&amp;#039; The above explanation is solely for educational and research purposes. Do not use this information for illegal activities.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Laboratory Environment:&amp;#039;&amp;#039;&amp;#039; It’s advisable to conduct these tests in an isolated laboratory environment to avoid unintended consequences.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Permission:&amp;#039;&amp;#039;&amp;#039; Always obtain necessary permissions before testing systems that are not owned by you.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [[Forensic: IT]]	&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;SMB (Server Message Block):&amp;#039;&amp;#039;&amp;#039; Learn in-depth about the SMB protocol, including how it works and common vulnerabilities.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Nmap:&amp;#039;&amp;#039;&amp;#039; Explore various features and options of Nmap that can be used for scanning and exploitation.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Network Forensics:&amp;#039;&amp;#039;&amp;#039; Study how to analyze network traffic to find evidence of suspicious activity.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Windows Forensics:&amp;#039;&amp;#039;&amp;#039; Learn how to analyze Windows systems to uncover evidence of cybercrime.&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>