For todayβs tool video, Iβm going to show you how to use the smbclient tool in order to sniff out and exploit smb file shares on windows systems to retrieve a sensitive file that contains password end user credentials.
File shares are one of the most CRITICAL end points to protect on any system. Thereβs a reason why OS systems CLOSE their ports by default on most systems.
Should a threat actor be able to breach the service, they will have access to any and all file shares on the system, as well as being able to upload and replace and or tamper with files within the FTP service. This can lead to a lot more complex exploits like living off the land for example.
Disclaimer
As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letβs begin!
- The Hacker Who Laughs πΈπΈππΈπΈ