Scanning for Conficker with Nmap

Using Nmap to scan for the famous Conficker worm.

<Update>
Nmap 4.85beta5 has all the scripts included, download it at http://nmap.org/download.html.

You'll still need to run a scan:

nmap --script=smb-check-vulns --script-args=safe=1 -p445 -d <target>

</Update>

<Update 2>
If you're having an OpenSSL problem, read this!

OpenSSL isn't included by default in the Nmap RPMs, and I wasn't properly checking for that in my scripts. Fyodor will have a beta5 RPM up tonight, which will fix that issue.

Until then, you have two options:
1. Use a source RPM
2. Compile straight from source, from the svn
</Update 2>

<Update 3>
If you're still having OpenSSL issues, try installing openssl-dev package, and install Nmap from source. Or, download the latest rpm (beta5) or svn version -- they have fixed the issue altogether (OpenSSL is no longer required!)

Further, if you're having an issue with error messages, this great post by Trevor2 might help:

NT_STATUS_OBJECT_NAME_NOT_FOUND can be returned if the browser service is disabled. There are at least two ways that can happen:
1) The service itself is disabled in the services list.
2) The registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Browser\Parameters\MaintainServerList is set to Off/False/No rather than Auto or yes.
On these systems, if you reenable the browser service, then the test will complete.

There are probably many other reasons why NT_STATUS_OBJECT_NAME_NOT_FOUND can be returned (e.g. not a windows OS, possibly infected) but I have not confirmed these.

Furthermore, this error will occur against on Windows NT.
</Update 3>

Hot on the coattails of the Simple Conficker Scanner, I've added detection for Conficker to Nmap. Currently, there are two ways of doing this -- you can check out the SVN version of Nmap and compile from source, or you can update the three necessary files.

Update from SVN

If you're on a Unix-like system, this is probably the easiest way. You can install it either system-wide or in a folder. Here is the system-wide command:

$ svn co --username=guest --password='' svn://svn.insecure.org/nmap
$ cd nmap
$ ./configure && make
$ sudo make install
$ nmap --script=smb-check-vulns --script-args=safe=1 -p445 -d <target>

If you prefer to run it from a local folder, use the following commands:

$ svn co --username=guest --password='' svn://svn.insecure.org/nmap
$ cd nmap
$ ./configure && make
$ export NMAPDIR=.
$ ./nmap --script=smb-check-vulns --script-args=safe=1 -p445 -d <target>

Update just the files

If you're on Windows, or don't want to compile from source, you can install the three datafiles.

First, make sure you're running Nmap 4.85beta4. That's the latest beta version. Then, download this file:

And place it in the "scripts" folder (see below).

Then, download these files:

  • http://www.skullsecurity.org/blogdata/msrpc.lua
  • http://www.skullsecurity.org/blogdata/smb.lua

And place them in the "nselib" folder (see below).

Where are the folders?

On Linux, try /usr/share/nmap/ or /usr/local/share/nmap or even /opt/share/nmap.

On Windows, try c:\program files\nmap

If all else fails, the scripts folder will contain a bunch of .nse files and the nselib folder will contain a bunch of lua files. Try searching your drive for smb-check-vulns.nse and msrpc.lua, and replace those.

Conclusion

Hopefully that helps! If you have any problems or questions, don't hesitate to contact me! My name is Ron, and my email domain is @skullsecurity.net.

Ron

138 thoughts on “Scanning for Conficker with Nmap

  1. Reply

    @FF

    Yes I'm using the latest build (beta7).

    Which of 100 packets do you need ?

    Traffic sequence:

    15:50:06.861377 IP source_ip.43155 > target_ip.445: Flags [S], seq 1341990831, win 1024, options [mss 1460], length 0
    15:50:06.861442 IP source_ip.43155 > target_ip.139: Flags [S], seq 1341990831, win 1024, options [mss 1460], length 0
    15:50:06.872869 IP target_ip.445 > source_ip.43155: Flags [S.], seq 3623159805, ack 1341990832, win 65535, options [mss 1460], length 0
    15:50:06.872902 IP source_ip.43155 > target_ip.445: Flags [R], seq 1341990832, win 0, length 0
    15:50:06.873277 IP target_ip.139 > source_ip.43155: Flags [S.], seq 4021475204, ack 1341990832, win 65535, options [mss 1460], length 0
    15:50:06.873294 IP source_ip.43155 > target_ip.139: Flags [R], seq 1341990832, win 0, length 0
    15:50:06.923894 IP source_ip.34694 > target_ip.137: NBT UDP PACKET(137): QUERY; REQUEST; UNICAST
    15:50:06.938724 IP target_ip.137 > source_ip.34694: NBT UDP PACKET(137): QUERY; POSITIVE; RESPONSE; UNICAST
    15:50:06.939967 IP source_ip.39845 > target_ip.445: Flags [S], seq 2346041494, win 5840, options [mss 1460,sackOK,TS val 115837 ecr 0,nop,wscale 6], length 0
    15:50:06.949950 IP target_ip.445 > source_ip.39845: Flags [S.], seq 331664242, ack 2346041495, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0,nop,nop,sackOK], length 0
    15:50:06.949983 IP source_ip.39845 > target_ip.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 115840 ecr 0], length 0
    15:50:06.951081 IP source_ip.39845 > target_ip.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 115840 ecr 0], length 53SMB PACKET: SMBnegprot (REQUEST)

    15:50:06.964497 IP target_ip.445 > source_ip.39845: Flags [P.], ack 54, win 65482, options [nop,nop,TS val 321580 ecr 115840], length 111SMB PACKET: SMBnegprot (REPLY)

    15:50:06.964535 IP source_ip.39845 > target_ip.445: Flags [.], ack 112, win 92, options [nop,nop,TS val 115843 ecr 321580], length 0
    15:50:06.965772 IP source_ip.39845 > target_ip.445: Flags [P.], ack 112, win 92, options [nop,nop,TS val 115844 ecr 321580], length 87SMB PACKET: SMBsesssetupX (REQUEST)

    15:50:06.978940 IP target_ip.445 > source_ip.39845: Flags [P.], ack 141, win 65395, options [nop,nop,TS val 321580 ecr 115844], length 88SMB PACKET: SMBsesssetupX (REPLY)

    15:50:06.979886 IP source_ip.39845 > target_ip.445: Flags [P.], ack 200, win 92, options [nop,nop,TS val 115847 ecr 321580], length 43SMB PACKET: SMBulogoffX (REQUEST)

    15:50:06.990513 IP target_ip.445 > source_ip.39845: Flags [P.], ack 184, win 65352, options [nop,nop,TS val 321580 ecr 115847], length 43SMB PACKET: SMBulogoffX (REPLY)

    15:50:06.991362 IP source_ip.39845 > target_ip.445: Flags [F.], seq 184, ack 243, win 92, options [nop,nop,TS val 115850 ecr 321580], length 0
    15:50:06.993362 IP source_ip.39846 > target_ip.445: Flags [S], seq 2341911890, win 5840, options [mss 1460,sackOK,TS val 115850 ecr 0,nop,wscale 6], length 0
    15:50:07.002825 IP target_ip.445 > source_ip.39845: Flags [F.], seq 243, ack 185, win 65352, options [nop,nop,TS val 321580 ecr 115850], length 0
    15:50:07.002883 IP source_ip.39845 > target_ip.445: Flags [.], ack 244, win 92, options [nop,nop,TS val 115853 ecr 321580], length 0
    15:50:07.003408 IP target_ip.445 > source_ip.39846: Flags [S.], seq 3985791898, ack 2341911891, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0,nop,nop,sackOK], length 0
    15:50:07.003441 IP source_ip.39846 > target_ip.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 115853 ecr 0], length 0
    15:50:07.020167 IP source_ip.39846 > target_ip.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 115857 ecr 0], length 53SMB PACKET: SMBnegprot (REQUEST)

    15:50:07.034156 IP target_ip.445 > source_ip.39846: Flags [P.], ack 54, win 65482, options [nop,nop,TS val 321581 ecr 115857], length 190SMB PACKET: SMBnegprot (REPLY)

    15:50:07.034212 IP source_ip.39846 > target_ip.445: Flags [.], ack 191, win 108, options [nop,nop,TS val 115861 ecr 321581], length 0
    15:50:07.035829 IP source_ip.39846 > target_ip.445: Flags [P.], ack 191, win 108, options [nop,nop,TS val 115861 ecr 321581], length 115SMB PACKET: SMBsesssetupX (REQUEST)

    15:50:07.048892 IP target_ip.445 > source_ip.39846: Flags [P.], ack 169, win 65367, options [nop,nop,TS val 321581 ecr 115861], length 140SMB PACKET: SMBsesssetupX (REPLY)

    15:50:07.050007 IP source_ip.39846 > target_ip.445: Flags [P.], ack 331, win 125, options [nop,nop,TS val 115865 ecr 321581], length 164SMB PACKET: SMBsesssetupX (REQUEST)

    15:50:07.064729 IP target_ip.445 > source_ip.39846: Flags [P.], ack 333, win 65203, options [nop,nop,TS val 321581 ecr 115865], length 84SMB PACKET: SMBsesssetupX (REPLY)

    15:50:07.065800 IP source_ip.39846 > target_ip.445: Flags [P.], ack 415, win 125, options [nop,nop,TS val 115869 ecr 321581], length 58SMB PACKET: SMBtconX (REQUEST)

    15:50:07.078746 IP target_ip.445 > source_ip.39846: Flags [P.], ack 391, win 65145, options [nop,nop,TS val 321581 ecr 115869], length 50SMB PACKET: SMBtconX (REPLY)

    15:50:07.079941 IP source_ip.39846 > target_ip.445: Flags [P.], ack 465, win 125, options [nop,nop,TS val 115872 ecr 321581], length 97SMB PACKET: SMBntcreateX (REQUEST)

    15:50:07.094218 IP target_ip.445 > source_ip.39846: Flags [P.], ack 488, win 65048, options [nop,nop,TS val 321581 ecr 115872], length 139SMB PACKET: SMBntcreateX (REPLY)

    15:50:07.095541 IP source_ip.39846 > target_ip.445: Flags [P.], ack 604, win 142, options [nop,nop,TS val 115876 ecr 321581], length 139SMB PACKET: SMBwriteX (REQUEST)

    15:50:07.108664 IP target_ip.445 > source_ip.39846: Flags [P.], ack 627, win 64909, options [nop,nop,TS val 321581 ecr 115876], length 51SMB PACKET: SMBwriteX (REPLY)

    15:50:07.110016 IP source_ip.39846 > target_ip.445: Flags [P.], ack 655, win 142, options [nop,nop,TS val 115880 ecr 321581], length 63SMB PACKET: SMBreadX (REQUEST)

    15:50:07.121179 IP target_ip.445 > source_ip.39846: Flags [P.], ack 690, win 64846, options [nop,nop,TS val 321582 ecr 115880], length 132SMB PACKET: SMBreadX (REPLY)

    15:50:07.122728 IP source_ip.39846 > target_ip.445: Flags [P.], ack 787, win 159, options [nop,nop,TS val 115883 ecr 321582], length 267SMB PACKET: SMBwriteX (REQUEST)

    15:50:07.136050 IP target_ip.445 > source_ip.39846: Flags [P.], ack 957, win 64579, options [nop,nop,TS val 321582 ecr 115883], length 51SMB PACKET: SMBwriteX (REPLY)

    15:50:07.137261 IP source_ip.39846 > target_ip.445: Flags [P.], ack 838, win 159, options [nop,nop,TS val 115886 ecr 321582], length 63SMB PACKET: SMBreadX (REQUEST)

    15:50:07.148884 IP target_ip.445 > source_ip.39846: Flags [P.], ack 1020, win 64516, options [nop,nop,TS val 321582 ecr 115886], length 92SMB PACKET: SMBreadX (REPLY)

    15:50:07.150364 IP source_ip.39846 > target_ip.445: Flags [P.], ack 930, win 159, options [nop,nop,TS val 115890 ecr 321582], length 39SMB PACKET: SMBtdis (REQUEST)

    15:50:07.163114 IP target_ip.445 > source_ip.39846: Flags [P.], ack 1059, win 64477, options [nop,nop,TS val 321582 ecr 115890], length 39SMB PACKET: SMBtdis (REPLY)

    15:50:07.164302 IP source_ip.39846 > target_ip.445: Flags [P.], ack 969, win 159, options [nop,nop,TS val 115893 ecr 321582], length 43SMB PACKET: SMBulogoffX (REQUEST)

    15:50:07.175300 IP target_ip.445 > source_ip.39846: Flags [P.], ack 1102, win 64434, options [nop,nop,TS val 321582 ecr 115893], length 43SMB PACKET: SMBulogoffX (REPLY)

    15:50:07.176291 IP source_ip.39846 > target_ip.445: Flags [F.], seq 1102, ack 1012, win 159, options [nop,nop,TS val 115896 ecr 321582], length 0
    15:50:07.176551 IP source_ip.39847 > target_ip.445: Flags [S], seq 2349645251, win 5840, options [mss 1460,sackOK,TS val 115896 ecr 0,nop,wscale 6], length 0
    15:50:07.188768 IP target_ip.445 > source_ip.39846: Flags [F.], seq 1012, ack 1103, win 64434, options [nop,nop,TS val 321582 ecr 115896], length 0
    15:50:07.188816 IP source_ip.39846 > target_ip.445: Flags [.], ack 1013, win 159, options [nop,nop,TS val 115899 ecr 321582], length 0
    15:50:07.188967 IP target_ip.445 > source_ip.39847: Flags [S.], seq 544434197, ack 2349645252, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0,nop,nop,sackOK], length 0
    15:50:07.188990 IP source_ip.39847 > target_ip.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 115899 ecr 0], length 0
    15:50:07.190228 IP source_ip.39847 > target_ip.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 115900 ecr 0], length 53SMB PACKET: SMBnegprot (REQUEST)

    15:50:07.204204 IP target_ip.445 > source_ip.39847: Flags [P.], ack 54, win 65482, options [nop,nop,TS val 321582 ecr 115900], length 190SMB PACKET: SMBnegprot (REPLY)

    15:50:07.204264 IP source_ip.39847 > target_ip.445: Flags [.], ack 191, win 108, options [nop,nop,TS val 115903 ecr 321582], length 0
    15:50:07.205927 IP source_ip.39847 > target_ip.445: Flags [P.], ack 191, win 108, options [nop,nop,TS val 115904 ecr 321582], length 115SMB PACKET: SMBsesssetupX (REQUEST)

    15:50:07.219088 IP target_ip.445 > source_ip.39847: Flags [P.], ack 169, win 65367, options [nop,nop,TS val 321582 ecr 115904], length 140SMB PACKET: SMBsesssetupX (REPLY)

    15:50:07.220064 IP source_ip.39847 > target_ip.445: Flags [P.], ack 331, win 125, options [nop,nop,TS val 115907 ecr 321582], length 164SMB PACKET: SMBsesssetupX (REQUEST)

    15:50:07.235342 IP target_ip.445 > source_ip.39847: Flags [P.], ack 333, win 65203, options [nop,nop,TS val 321583 ecr 115907], length 84SMB PACKET: SMBsesssetupX (REPLY)

    15:50:07.236239 IP source_ip.39847 > target_ip.445: Flags [P.], ack 415, win 125, options [nop,nop,TS val 115911 ecr 321583], length 58SMB PACKET: SMBtconX (REQUEST)

    15:50:07.248875 IP target_ip.445 > source_ip.39847: Flags [P.], ack 391, win 65145, options [nop,nop,TS val 321583 ecr 115911], length 50SMB PACKET: SMBtconX (REPLY)

    15:50:07.249816 IP source_ip.39847 > target_ip.445: Flags [P.], ack 465, win 125, options [nop,nop,TS val 115914 ecr 321583], length 97SMB PACKET: SMBntcreateX (REQUEST)

    15:50:07.263986 IP target_ip.445 > source_ip.39847: Flags [P.], ack 488, win 65048, options [nop,nop,TS val 321583 ecr 115914], length 139SMB PACKET: SMBntcreateX (REPLY)

    15:50:07.264877 IP source_ip.39847 > target_ip.445: Flags [P.], ack 604, win 142, options [nop,nop,TS val 115918 ecr 321583], length 139SMB PACKET: SMBwriteX (REQUEST)

    15:50:07.278824 IP target_ip.445 > source_ip.39847: Flags [P.], ack 627, win 64909, options [nop,nop,TS val 321583 ecr 115918], length 51SMB PACKET: SMBwriteX (REPLY)

    15:50:07.279688 IP source_ip.39847 > target_ip.445: Flags [P.], ack 655, win 142, options [nop,nop,TS val 115922 ecr 321583], length 63SMB PACKET: SMBreadX (REQUEST)

    15:50:07.291150 IP target_ip.445 > source_ip.39847: Flags [P.], ack 690, win 64846, options [nop,nop,TS val 321583 ecr 115922], length 132SMB PACKET: SMBreadX (REPLY)

    15:50:07.292123 IP source_ip.39847 > target_ip.445: Flags [P.], ack 787, win 159, options [nop,nop,TS val 115925 ecr 321583], length 187SMB PACKET: SMBwriteX (REQUEST)

    15:50:07.304547 IP target_ip.445 > source_ip.39847: Flags [P.], ack 877, win 64659, options [nop,nop,TS val 321583 ecr 115925], length 51SMB PACKET: SMBwriteX (REPLY)

    15:50:07.305471 IP source_ip.39847 > target_ip.445: Flags [P.], ack 838, win 159, options [nop,nop,TS val 115928 ecr 321583], length 63SMB PACKET: SMBreadX (REQUEST)

    15:50:07.318709 IP target_ip.445 > source_ip.39847: Flags [P.], ack 940, win 64596, options [nop,nop,TS val 321583 ecr 115928], length 104SMB PACKET: SMBreadX (REPLY)

    15:50:07.319607 IP source_ip.39847 > target_ip.445: Flags [P.], ack 942, win 159, options [nop,nop,TS val 115932 ecr 321583], length 39SMB PACKET: SMBtdis (REQUEST)

    15:50:07.331030 IP target_ip.445 > source_ip.39847: Flags [P.], ack 979, win 64557, options [nop,nop,TS val 321583 ecr 115932], length 39SMB PACKET: SMBtdis (REPLY)

    15:50:07.331885 IP source_ip.39847 > target_ip.445: Flags [P.], ack 981, win 159, options [nop,nop,TS val 115935 ecr 321583], length 43SMB PACKET: SMBulogoffX (REQUEST)

    15:50:07.342965 IP target_ip.445 > source_ip.39847: Flags [P.], ack 1022, win 64514, options [nop,nop,TS val 321584 ecr 115935], length 43SMB PACKET: SMBulogoffX (REPLY)

    15:50:07.344017 IP source_ip.39847 > target_ip.445: Flags [F.], seq 1022, ack 1024, win 159, options [nop,nop,TS val 115938 ecr 321584], length 0
    15:50:07.344314 IP source_ip.39848 > target_ip.445: Flags [S], seq 2343636157, win 5840, options [mss 1460,sackOK,TS val 115938 ecr 0,nop,wscale 6], length 0
    15:50:07.353725 IP target_ip.445 > source_ip.39847: Flags [F.], seq 1024, ack 1023, win 64514, options [nop,nop,TS val 321584 ecr 115938], length 0
    15:50:07.353778 IP source_ip.39847 > target_ip.445: Flags [.], ack 1025, win 159, options [nop,nop,TS val 115940 ecr 321584], length 0
    15:50:07.354625 IP target_ip.445 > source_ip.39848: Flags [S.], seq 3187009972, ack 2343636158, win 65535, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0,nop,nop,sackOK], length 0
    15:50:07.354654 IP source_ip.39848 > target_ip.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 115941 ecr 0], length 0
    15:50:07.355614 IP source_ip.39848 > target_ip.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 115941 ecr 0], length 53SMB PACKET: SMBnegprot (REQUEST)

    15:50:07.369151 IP target_ip.445 > source_ip.39848: Flags [P.], ack 54, win 65482, options [nop,nop,TS val 321584 ecr 115941], length 190SMB PACKET: SMBnegprot (REPLY)

    15:50:07.369202 IP source_ip.39848 > target_ip.445: Flags [.], ack 191, win 108, options [nop,nop,TS val 115944 ecr 321584], length 0
    15:50:07.370602 IP source_ip.39848 > target_ip.445: Flags [P.], ack 191, win 108, options [nop,nop,TS val 115945 ecr 321584], length 115SMB PACKET: SMBsesssetupX (REQUEST)

    15:50:07.384675 IP target_ip.445 > source_ip.39848: Flags [P.], ack 169, win 65367, options [nop,nop,TS val 321584 ecr 115945], length 140SMB PACKET: SMBsesssetupX (REPLY)

    15:50:07.385607 IP source_ip.39848 > target_ip.445: Flags [P.], ack 331, win 125, options [nop,nop,TS val 115948 ecr 321584], length 164SMB PACKET: SMBsesssetupX (REQUEST)

    15:50:07.401645 IP target_ip.445 > source_ip.39848: Flags [P.], ack 333, win 65203, options [nop,nop,TS val 321584 ecr 115948], length 84SMB PACKET: SMBsesssetupX (REPLY)

    15:50:07.402552 IP source_ip.39848 > target_ip.445: Flags [P.], ack 415, win 125, options [nop,nop,TS val 115952 ecr 321584], length 58SMB PACKET: SMBtconX (REQUEST)

    15:50:07.551454 IP target_ip.445 > source_ip.39848: Flags [P.], ack 391, win 65145, options [nop,nop,TS val 321585 ecr 115952], length 50SMB PACKET: SMBtconX (REPLY)

    15:50:07.552374 IP source_ip.39848 > target_ip.445: Flags [P.], ack 465, win 125, options [nop,nop,TS val 115990 ecr 321585], length 95SMB PACKET: SMBntcreateX (REQUEST)

    15:50:07.768936 IP target_ip.445 > source_ip.39848: Flags [P.], ack 486, win 65050, options [nop,nop,TS val 321587 ecr 115990], length 39SMB PACKET: SMBntcreateX (REPLY)

    15:50:07.769958 IP source_ip.39848 > target_ip.445: Flags [P.], ack 504, win 125, options [nop,nop,TS val 116044 ecr 321587], length 39SMB PACKET: SMBtdis (REQUEST)

    15:50:07.886409 IP target_ip.445 > source_ip.39848: Flags [P.], ack 525, win 65011, options [nop,nop,TS val 321590 ecr 116044], length 39SMB PACKET: SMBtdis (REPLY)

    15:50:07.887258 IP source_ip.39848 > target_ip.445: Flags [P.], ack 543, win 125, options [nop,nop,TS val 116073 ecr 321590], length 43SMB PACKET: SMBulogoffX (REQUEST)

    15:50:07.899029 IP target_ip.445 > source_ip.39848: Flags [P.], ack 568, win 64968, options [nop,nop,TS val 321590 ecr 116073], length 43SMB PACKET: SMBulogoffX (REPLY)

    15:50:07.899921 IP source_ip.39848 > target_ip.445: Flags [F.], seq 568, ack 586, win 125, options [nop,nop,TS val 116076 ecr 321590], length 0
    15:50:07.909459 IP target_ip.445 > source_ip.39848: Flags [F.], seq 586, ack 569, win 64968, options [nop,nop,TS val 321590 ecr 116076], length 0
    15:50:07.909519 IP source_ip.39848 > target_ip.445: Flags [.], ack 587, win 125, options [nop,nop,TS val 116079 ecr 321590], length 0

    1. Reply

      Ron Post author

      @@FF

      It's hard to say -- can you email me the full packet capture? ron at skullsecurity.net.

      If you're using tcpdump, the command would probably be:
      tcpdump -s0 -w output.pcap "tcp port 445"

      When it's done, send me output.pcap.

      Thanks!

  2. Reply

    Mellaly

    If you have windows firewall on, the browser service will only run if you have the File and Print sharing exception set.

  3. Reply

    adam

    Great blog - for beginners with nmap check out my enumeration tutorial here => http://adamonsecurity.com/?p=139

    Leave me a comment with what you think !

  4. Reply

    chota bheem cartoon games

    If you have windows firewall on, the browser service will only run if you have the File and Print sharing exception set.

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>