<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Forensic%3A_msfconsole_use_auxiliary%2Fscanner%2Fsmb%2Fsmb_enumshares_attack_%28en%29</id>
	<title>Forensic: msfconsole use auxiliary/scanner/smb/smb enumshares attack (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Forensic%3A_msfconsole_use_auxiliary%2Fscanner%2Fsmb%2Fsmb_enumshares_attack_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Forensic:_msfconsole_use_auxiliary/scanner/smb/smb_enumshares_attack_(en)&amp;action=history"/>
	<updated>2026-05-04T17:34:11Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Forensic:_msfconsole_use_auxiliary/scanner/smb/smb_enumshares_attack_(en)&amp;diff=70971&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;==What is `msfconsole use auxiliary/scanner/smb/smb_enumshares`?==  This command is one of the modules in the Metasploit Framework used for enumeration or reconnaissance of th...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Forensic:_msfconsole_use_auxiliary/scanner/smb/smb_enumshares_attack_(en)&amp;diff=70971&amp;oldid=prev"/>
		<updated>2024-10-19T22:26:46Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==What is `msfconsole use auxiliary/scanner/smb/smb_enumshares`?==  This command is one of the modules in the Metasploit Framework used for enumeration or reconnaissance of th...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==What is `msfconsole use auxiliary/scanner/smb/smb_enumshares`?==&lt;br /&gt;
&lt;br /&gt;
This command is one of the modules in the Metasploit Framework used for enumeration or reconnaissance of the Server Message Block (SMB) service on a system. SMB is a network protocol commonly used for sharing files and printers in Windows networks. By using this module, an attacker can identify:&lt;br /&gt;
&lt;br /&gt;
* '''Available Shares:''' This module will display a list of shares published by the target, such as shares for folders, printers, etc.&lt;br /&gt;
* '''Access Rights:''' Sometimes, this module can also provide information about access rights (read, write, execute) for those shares.&lt;br /&gt;
&lt;br /&gt;
This information is very valuable for attackers as it can serve as a starting point for further attacks, such as:&lt;br /&gt;
&lt;br /&gt;
* '''Finding Sensitive Files:''' If there are shares containing important files, the attacker may try to access them.&lt;br /&gt;
* '''Finding Vulnerabilities:''' Information about shares and access rights can be used to look for vulnerabilities that can be exploited.&lt;br /&gt;
&lt;br /&gt;
==Example Attack==&lt;br /&gt;
&lt;br /&gt;
'''Objective:''' Identify shares on an Ubuntu 24.04 server running the SMB service.&lt;br /&gt;
&lt;br /&gt;
'''Steps:'''&lt;br /&gt;
&lt;br /&gt;
1. '''Open Metasploit:'''&lt;br /&gt;
&lt;br /&gt;
 msfconsole&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. '''Select the module:'''&lt;br /&gt;
&lt;br /&gt;
 use auxiliary/scanner/smb/smb_enumshares&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. '''Set the target:'''&lt;br /&gt;
&lt;br /&gt;
 set RHOSTS &amp;lt;target_IP_address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Replace `&amp;lt;target_IP_address&amp;gt;` with the target server's IP address.&lt;br /&gt;
&lt;br /&gt;
4. '''Run the scan:'''&lt;br /&gt;
&lt;br /&gt;
 run&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Results:''' If successful, Metasploit will display a list of found shares along with additional information such as share name, type, and comments.&lt;br /&gt;
&lt;br /&gt;
==Attack Forensics==&lt;br /&gt;
&lt;br /&gt;
'''Objective:''' Find evidence of an attack using the `smb_enumshares` module.&lt;br /&gt;
&lt;br /&gt;
'''Steps:'''&lt;br /&gt;
&lt;br /&gt;
1. '''Log Analysis:'''&lt;br /&gt;
* '''Metasploit Logs:''' Check the Metasploit logs for suspicious activity, such as the use of the `smb_enumshares` module and the targeted hosts.&lt;br /&gt;
* '''Target System Logs:''' Look for log entries related to the SMB service, such as unauthorized access to specific shares.&lt;br /&gt;
&lt;br /&gt;
2. '''Network Traffic Analysis:'''&lt;br /&gt;
* '''Capture Network Traffic:''' Use tools like Wireshark to capture network traffic occurring during the attack.&lt;br /&gt;
* '''Filter Traffic:''' Filter the traffic based on the SMB protocol and the ports used (139 and 445).&lt;br /&gt;
* '''Search for SMB Packets:''' Look for SMB packets containing requests for share enumeration.&lt;br /&gt;
&lt;br /&gt;
3. '''File Analysis:'''&lt;br /&gt;
* '''Look for Log Files:''' Search for log files related to the SMB service to identify suspicious activity.&lt;br /&gt;
* '''System File Analysis:''' Check system files to see if there are any files or directories accessed without authorization.&lt;br /&gt;
&lt;br /&gt;
'''Evidence that can be found:'''&lt;br /&gt;
&lt;br /&gt;
* '''Metasploit Logs:''' Records of the use of the `smb_enumshares` module.&lt;br /&gt;
* '''System Logs:''' Records of unauthorized access to SMB shares.&lt;br /&gt;
* '''Network Capture:''' SMB packets containing requests for share enumeration.&lt;br /&gt;
* '''Log Files:''' Records of suspicious activity in the SMB service.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
* '''Update the System:''' Ensure the system is always updated with the latest security patches.&lt;br /&gt;
* '''Limit Access:''' Restrict access to the SMB service only to authorized users.&lt;br /&gt;
* '''Use a Firewall:''' Configure the firewall to block unauthorized access to SMB ports.&lt;br /&gt;
* '''Monitor Logs:''' Regularly monitor system logs and application logs for suspicious activity.&lt;br /&gt;
* '''Implement IDS/IPS:''' Use an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) to detect and prevent attacks.&lt;br /&gt;
&lt;br /&gt;
==Important to Remember:==&lt;br /&gt;
&lt;br /&gt;
* '''Legality:''' The use of tools like Metasploit should be done with appropriate permissions and only for educational or security testing purposes.&lt;br /&gt;
* '''Ethics:''' Do not conduct attacks on systems for which you do not have permission.&lt;br /&gt;
&lt;br /&gt;
By understanding how these attacks work and the forensic steps that can be taken, you can better protect your systems from similar threats.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [[Forensic: IT]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>