Are you an LLM? You can read better optimized documentation at /pentesting-manual/active-directory/enumeration/fileshare-enumeration.md for this page in Markdown format
Fileshare enumeration
Snaffler
Enumerate file shares in the local network to find credentials and sensitive files.
- Find the Syslifters compiled Snaffler version here: Snaffler.exe
- Run
snaffler.exe -s -o snaffler.log - After running Snaffler, parse the
snaffler.logwith our log parser snaffler_parse.py for colored CLI output, filtering, and XLSX export:
powershell
Usage:
python snaffler_parse.py <logfile> # colored CLI output
python snaffler_parse.py <logfile> -x output.xlsx # export to XLSX
python snaffler_parse.py <logfile> -s black,red # filter by severity
python snaffler_parse.py <logfile> -t file # only File findings
python snaffler_parse.py <logfile> -t share # only Share findings
python snaffler_parse.py <logfile> --host SGRZSCCM1 # filter by hostname
python snaffler_parse.py <logfile> --rule KeepConfig # filter by rule name
python snaffler_parse.py <logfile> --stats # summary statisticsShareRanger
Use ShareRanger to enumerate file shares in the local network and to find credentials, sensitive files, as well as writable directories (e.g., web roots).
powershell
Usage:
python -m shareranger.cli
./shareranger.exe