Null Sessions
Introduction
THIS ATTACK ONLY WORKS ON LEGACY WINDOWS SYSTEMS
These attacks can be used to enumerate
Passwords
System Users
System Groups
Running System Processes
Null sessions are remotely exploitable, they can be used to call remote apis and remote procedure calls,
Enumerating Windows Shares
Service Enumeration using nbtstat (windows)
Analyzing Output Codes
<00>
means machine is a workstation<UNIQUE>
means only 1 ip is assigned<20>
tells us that file sharing service is up and running on the machine
Shares Enumeration using Net View (windows)
Service Enumeration using nmblookup (linux)
Shares Enumeration using smbclient (linux)
-N forces tool to not ask for password
This tool also list administrative shares that are hidden by using windows tools.
Checking for Null Sessions
We try to connect to ipc$
administrative share without valid credentials. These don't work with C$
Windows
This tells windows to connect with empty password and empty username.
Linux
Exploiting with Enum Script
It can be run from windows cmd.
-S lets you enumerate shares of machine, it enumerates admin shares too
-U enumerates the users
-P tells you about the password policy which is useful for password cracking.
Exploiting with Winfo Script
It is also a cli script used to automate null session attack
Exploiting with Enum4Linux
It is also used to attack null sessions.
Last updated