3. Null Session SMB Enumeration
Last updated
Last updated
Now we are trying to enumerate SMB shares using a null session — which means trying to access the SMB service without any username or password. This is useful when the server is misconfigured and allows anonymous access.
smbclient
Explanation:
-N
→ No password prompt (null session)
-L
→ List available SMB shares on the target
//IP
→ Target IP in UNC format
🔍 Look for:
IPC$
→ Named pipes (usually always there)
NETLOGON
, SYSVOL
, Users
→ Might contain useful data in domain environments
I tried method 1 but it didn't work :
So let's head to method 2.
netexec
(formerly crackmapexec
)Explanation:
-u ''
→ Empty username
-p ''
→ Empty password
--shares
→ Tells the tool to enumerate shared folders
✅ Now you successfully connected to the SMB service using a null session (no username/password).
[*] Windows 10 / Server 2019 Build 17763 x64
This confirms the target is likely a Windows Server 2019, in themegachange.nyx
domain.
[-] Error enumerating shares: STATUS_ACCESS_DENIED
This means anonymous access is not allowed to list SMB shares. The server requires authentication to view them.
We have to try valid credentials later:
It doesn't matter to login now, all we need is the FQDN
: megachange.nyx