The SMB Access from Linux Cheat Sheet by SANS is a pocket reference guide that provides a comprehensive overview of using smbclient and rpcclient tools to access Windows systems from Linux hosts. It covers various features, including changing user passwords, enumerating password policy information, creating new users and shares, and enumerating user and group settings. This cheat sheet is designed for cybersecurity analysts to simplify the complex process of accessing Windows systems through SMB and RPC protocols from Linux systems. It provides commands and examples for using rpcclient to perform various tasks, such as changing passwords, enumerating password policy information, creating new users and shares, and more. Additionally, it explains how to authenticate to the Windows target using a username and password or by specifying the NT hash value. This cheat sheet is an essential resource for cybersecurity professionals, allowing them to easily access and manipulate Windows systems from a Linux host, making it an valuable tool for penetration testing, incident response, and other cybersecurity tasks.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.
A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.
A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.
A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance for network monitoring and intrusion detection applications.
A pocket reference guide providing various options for navigating and pivoting through different environments and situations.
A comprehensive PowerShell cheat sheet covering various tasks and techniques for file management, process management, network operations, and system administration.
A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.