Using Windows CMD, how would an attacker list all the shares to which the current user context has access?
A.
NET USE
B.
NET CONFIG
C.
NET FILE
D.
NET VIEW
Explanation:
Connects a computer to or disconnects a computer from a shared resource, or displays information about
computer connections. The command also controls persistent net connections. Used without parameters, net
use retrieves a list of network connections.
https://technet.microsoft.com/en-us/library/bb490717.aspx
Should be “net view”?
Yes I think net view is the correct answer.
From CEHTM v9 Certified Ethical Hacker Version 9 Study Guide
To view the shares available on a particular system, after issuing the command to connect
to the ipc$ share on the target system, issue the following command:
net view \\zelda
This command lists the shares on the system.
Once an attacker has this list of shares, the next step is to connect to a share and view
the data. This is easy to do at this point by using the net use command:
net use s: \\zelda\(shared folder name)