SYS.MEM.ALLOC
0x0000
NET.UPLINK
ESTABLISHING
SEC.PROTOCOL
AWAITING
DATA.STREAM
0.0.0.0
0%
INITIALIZING SYSTEM
[
]
Portfolio Learn Month 02 Networking Basics

🔍 Day 21: SMB Enumeration

Networking TryHackMe SMB

Enumeration is the key to the kingdom. In this lab, we dive deep into the SMB protocol to discover hidden shares, users, and potential entry points. 🛡️


🛠️ 1. Initial Reconnaissance: enum4linux

The first step was running a full scan using enum4linux to see what the target machine was hiding.

Command Structure: enum4linux [OPTIONS] [IP]

📊 Common enum4linux Flags

Tag Function
-UGet userlist
-MGet machine list
-NGet namelist dump (different from -U and -M)
-SGet sharelist
-PGet password policy information
-GGet group and member list
-aAll of the above (full basic enumeration)

My Action: I ran enum4linux -a 10.113.134.237 and found these key details:


📂 2. Accessing the Share: smbclient

To enter the shared folders, we need a client. Linux uses smbclient. You need the IP, the Share name, a Username, and the Port.

Basic Syntax:

smbclient //[IP]/[SHARE] -U [USERNAME] -p [PORT]

My Action in THM:
I connected successfully without a password using:

smbclient //10.113.134.237/profiles -U cactus -p 445

🔍 Understanding File Attributes

Inside the share, I noticed letters next to the files. These are important:


Note: This exploration is continued in the next session.