Fix some typos in pentesting smb

This commit is contained in:
HexPandaa 2022-07-13 13:11:15 +02:00 committed by GitHub
parent 7207d134b9
commit 10015ab66a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -439,7 +439,7 @@ In **kali** it is located on /usr/share/doc/python3-impacket/examples/
```bash
nmap --script smb-brute -p 445 <IP>
ridenum.py <IP> 500 50000 /root/passwds.txt #Get usernames bruteforcing that rids and then try to bruteforce eachusername
ridenum.py <IP> 500 50000 /root/passwds.txt #Get usernames bruteforcing that rids and then try to bruteforce each user name
```
## SMB relay attack
@ -451,7 +451,7 @@ This attack uses the Responder toolkit to **capture SMB authentication sessions*
The Windows library URLMon.dll automatically try to authenticaticate to the host when a page tries to access some contect via SMB, for example: `img src="\\10.10.10.10\path\image.jpg"`
This happens with the funcions:
This happens with the functions:
* URLDownloadToFile
* URLDownloadToCache