Skip to content

Network Shares

Evidence: Network Shares
Description: Collect information about network shares
Category: Network
Platform: windows
Short Name: netshr
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Windows systems can share folders, printers, and other resources over the network via SMB/CIFS. Each share has a name, local path, permissions, and connection information.

Share enumeration can reveal unauthorized file shares, administrative shares, and data exfiltration staging points.

This collector gathers structured data about network shares.

FieldDescriptionExample
NameShare nameSharedDocs
TypeShare typeDisk, Special, Temporary
CommentsShare descriptionShared documents folder
PermissionsShare permissions0
PathLocal path being sharedC:\SharedDocs
PasswordShare password (if any)
ConnectionsCurrent connection count3

This collector uses Windows Network API:

  • NetShareEnum with level 502 (detailed information)
  • Enumerates all shares including hidden administrative shares
  • Extracts share configuration and permissions

Share types include:

  • STYPE_DISKTREE: Disk share
  • STYPE_PRINTQ: Print queue
  • STYPE_DEVICE: Communication device
  • STYPE_IPC: Interprocess communication
  • STYPE_SPECIAL: Special share (C$, ADMIN$, etc.)
  • STYPE_TEMPORARY: Temporary share

Network share enumeration reveals potential data exposure and lateral movement paths. Investigators use this data to identify unauthorized file shares, detect administrative share access, track shared resource exposure, identify data exfiltration staging, detect lateral movement infrastructure, and audit share permissions and configuration.