-
Notifications
You must be signed in to change notification settings - Fork 2.7k
Closed
Description
Against win2k3 R2 box:
nmap -p445 --script=smb-enum-users -nvv 192.168.72.141
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-20 14:00 GMT
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 14:00
Completed NSE at 14:00, 0.00s elapsed
Initiating ARP Ping Scan at 14:00
Scanning 192.168.72.141 [1 port]
Completed ARP Ping Scan at 14:00, 0.23s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 14:00
Scanning 192.168.72.141 [1 port]
Discovered open port 445/tcp on 192.168.72.141
Completed SYN Stealth Scan at 14:00, 0.27s elapsed (1 total ports)
NSE: Script scanning 192.168.72.141.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 14:00
Completed NSE at 14:00, 0.10s elapsed
Nmap scan report for 192.168.72.141
Host is up, received arp-response (0.00087s latency).
Scanned at 2015-11-20 14:00:11 GMT for 0s
PORT STATE SERVICE REASON
445/tcp open microsoft-ds syn-ack ttl 128
MAC Address: 00:0C:29:B6:2E:1C (VMware)
NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 14:00
Completed NSE at 14:00, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 1.32 seconds
Raw packets sent: 3 (116B) | Rcvd: 3 (116B)
if we add -dd we can see it is gathering usernames:
NSE: [smb-enum-users M:1819b40 192.168.72.141] SMB: Closing socket
NSOCK INFO [1.1870s] nsi_delete(): nsi_delete (IOD #3)
NSE: [smb-enum-users M:1819b40 192.168.72.141] EnumUsers: Received 110 names from LSA
NSE: Finished smb-enum-users M:1819b40 against 192.168.72.141.