which the current user context has access?

Using Windows CMD, how would an attacker list all the shares to which the current user context has access?

Using Windows CMD, how would an attacker list all the shares to which the current user context has access?

A.
NET USE

B.
NET CONFIG

C.
NET FILE

D.
NET VIEW

Explanation:
Connects a computer to or disconnects a computer from a shared resource, or displays information about
computer connections. The command also controls persistent net connections. Used without parameters, net
use retrieves a list of network connections.
https://technet.microsoft.com/en-us/library/bb490717.aspx



Leave a Reply 3

Your email address will not be published. Required fields are marked *


hung

hung

Should be “net view”?

ezgi

ezgi

Yes I think net view is the correct answer.

From CEHTM v9 Certified Ethical Hacker Version 9 Study Guide

To view the shares available on a particular system, after issuing the command to connect
to the ipc$ share on the target system, issue the following command:
net view \\zelda
This command lists the shares on the system.

ezgi

ezgi

Once an attacker has this list of shares, the next step is to connect to a share and view
the data. This is easy to do at this point by using the net use command:
net use s: \\zelda\(shared folder name)