mirror of
https://github.com/nmap/nmap.git
synced 2025-12-09 06:01:28 +00:00
Merge in changes from my private branch, primarily smb-brute.nse and smb-pwdump.nse, among other smaller changes.
This commit is contained in:
@@ -1,5 +1,20 @@
|
||||
description = [[
|
||||
Attempts to enumerate domains on a system, along with their policies. This will likely only work without credentials against Windows 2000.
|
||||
Attempts to enumerate domains on a system, along with their policies. This generally requires
|
||||
credentials, except against Windows 2000. In addition to the actual domain, the "Builtin"
|
||||
domain is generally displayed. Windows returns this in the list of domains, but its policies
|
||||
don't appear to be used anywhere.
|
||||
|
||||
Much of the information provided is useful to a penetration tester, because it tells the
|
||||
tester what types of policies to expect. For example, if passwords have a minimum length of 8,
|
||||
the tester can trim his database to match; if the minimum length is 14, the tester will
|
||||
probably start looking for sticky notes on people's monitors.
|
||||
|
||||
Another useful piece of information is the password lockouts -- a penetration tester often wants
|
||||
to know whether or not there's a risk of negatively impacting a network, and this will
|
||||
indicate it. The SID is displayed, which may be useful in other tools; the users are listed,
|
||||
which uses different functions than <code>smb-enum-users.nse</code> (though likely won't
|
||||
get different results), and the date and time the domain was created may give some insight into
|
||||
its history.
|
||||
|
||||
After the initial <code>bind</code> to SAMR, the sequence of calls is:
|
||||
* <code>Connect4</code>: get a connect_handle
|
||||
|
||||
Reference in New Issue
Block a user