Internal Infrastructure Pentest - Null Session

less than 1 minute read

  • Active Reconnaissance Methods:
    • Null Session:
      • net use \[DA IP Address]\ipc$ “” “/user:”
      • here we’re trying to connect using a blank password and username
      • if you see “the command completed successfully”. At this moment we’be made successful connection.
    • Confirm Null Session is mapped:
      • net use
      • Now one should see a mapping to the IPC$ share to each computer to which attacker machine is connected
        C:\WINDOWS\system32>net use
        New connections will be remembered.
              
        Status    Local   Remote              Network
        ______________________________________________________
        OK                \\IP\$IPC           Microsoft Windows Network
        
  • Once an attacker creates an successful null connection, you can use tools like Dumpsec or Winfo to gether informaiton about user and password policy.

  • Download winfo: http://www.ntsecurity.nu/toolbox/winfo
  • Download Dumpsec: http://www.systemtools.com/somarsoft/index.html