本节书摘来自异步社区《Nmap渗透测试指南》一书中的第9章9.6节审计SMB口令,作者 商广明,更多章节内容可以访问云栖社区“异步社区”公众号查看。
9.6 审计SMB口令表9.7所示为本章节所需Nmap命令表,表中加粗命令为本小节所需命令——审计SMB口令。
操作步骤使用命令“nmap --script smb-brute.nse -p445 目标”即可对目标SMB服务进行口令审计。
root@Wing:~# nmap --script smb-brute.nse -p445 192.168.126.128 Starting Nmap 6.40 ( http://nmap.org ) at 2014-06-13 13:10 CST Nmap scan report for 192.168.126.128 Host is up (0.00024s latency). PORT STATE SERVICE 445/tcp open microsoft-ds MAC Address: 00:0C:29:D3:9D:B9 (VMware) Host script results: | smb-brute: | administrator:<blank> => Valid credentials | guest:<blank> => Valid credentials, account disabled |_ wing:<blank> => Valid credentials Nmap done: 1 IP address (1 host up) scanned in 6.71 seconds root@Wing:~#分析使用smb-brute.nse脚本可以对目标进行SMB口令的审计,以上结果表明目标并没有设置系统口令,这是相当危险的,我们仅用了6秒的时间就破解了目标的所有账户。对于复杂的密码,我们还可以使用passdb选项指向一个自定义字典。
root@Wing:~# nmap --script smb-brute.nse --script-args passdb=pass.txt -p445 192.168.126.128 Starting Nmap 6.40 ( http://nmap.org ) at 2014-06-13 13:14 CST Nmap scan report for 192.168.126.128 Host is up (0.00031s latency). PORT STATE SERVICE 445/tcp open microsoft-ds MAC Address: 00:0C:29:D3:9D:B9 (VMware) Host script results: | smb-brute: | administrator:<blank> => Valid credentials | guest:<blank> => Valid credentials, account disabled |_ wing:<blank> => Valid credentials Nmap done: 1 IP address (1 host up) scanned in 0.37 seconds root@Wing:~# 相关资源:敏捷开发V1.0.pptx