03.DANCING (SMB)
OVERVIEW
Target Service: SMB
Attack: Anonymous Access
Vulnerability: Anonymous Access
MITRE Tactics & Technques:
Summary: The target system exposed several SMB shares, accessible via anonymous access
with no proper authentication hardening. A list of shares was retrieved using
showing several administrative and custom shares (ADMIN$, C$, IPC$, and
WorkShares). The WorkShares share was accessible, containing directories for
users.
root@oco:~$ sudo openvpn ~/Downloads/starting_point.ovpn
ENUMERATE SERVICES
root@oco:~$ nmap -sV -T4 10.129.13.4 -p-
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49668/tcp open msrpc Microsoft Windows RPC
49669/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
* think of port 445 (smb) as an active share that can be accessed/explored if it is
running on the target
VULNERABILITY SCANNING
root@htb:~$ nmap -sV -sC -T4 10.129.13.4 -p 445
PORT STATE SERVICE VERSION
445/tcp open microsoft-ds?
Host script results:
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
|_clock-skew: 3h59m59s
| smb2-time:
| date: 2025-01-22T01:28:31
|_ start_date: N/A
* the -SC runs the default set of Nmap scripts (NSE scripts), which typically include
scripts for service enumeration, version detection, and other basic checks.
root@htb:~$ sudo nmap --script=vuln 10.129.13.4 -p 445
445/tcp open microsoft-ds
Host script results:
|_samba-vuln-cve-2012-1182: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR
|_smb-vuln-ms10-061: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR
|_smb-vuln-ms10-054: false
Nmap done: 1 IP address (1 host up) scanned in 23.15 seconds
* the --script=vuln will run scripts that focus specifically on detecting known
vulnerabilities in the service running on port 445
- e.g., weak smb configurations, or known vulnerabilities in the smb service
- if no results are found then the service may be fully patched!
FOOTHOLD/COMPROMISE
Last updated