Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

🏠 Back to Blog

Snaffler Cheatsheet

Tool for hunting credentials and sensitive data across SMB shares in Active Directory environments. Enumerates domain hosts, discovers readable shares, and searches for files of interest.


Requirements

  • Must be run from a domain-joined host or in a domain-user context
  • .NET executable (Windows only)

Basic Usage

.\Snaffler.exe -s -d domain.local -o snaffler.log -v data

Flags

FlagDescription
-sPrint results to console
-dDomain to search
-oOutput log file path
-vVerbosity level

Verbosity Levels

LevelDescription
dataResults only (recommended — easiest to review)
infoResults + informational messages
debugVerbose debug output
traceMaximum verbosity

Output Color Coding

ColorMeaning
RedHigh interest — keys, database dumps, credentials
GreenShares discovered
BlackNotable files — password databases, VPN configs

File Types Snaffler Looks For

CategoryExtensions
Credential stores.kdb, .kwallet, .psafe3
Keys.key, .keypair, .ppk, .keychain
Database dumps.sqldump, .mdf
VPN / Network configs.tblk
Config filesweb.config, .conf, .ini
Scripts with passwords.ps1, .bat, .cmd, .vbs

Tips

  • Output can be very large in big environments — always use -o to write to a log file
  • Use -v data to keep console output manageable
  • Let Snaffler run in the background and review results later
  • Provide raw Snaffler output to clients as supplemental data to help them prioritize share lockdown
  • Pair with CrackMapExec spider_plus for complementary share enumeration