smbtree - A text based smb network browser


   smbtree [-b] [-D] [-S]


   This tool is part of the samba(7) suite.

   smbtree is a smb browser program in text mode. It is similar to the
   "Network Neighborhood" found on Windows computers. It prints a tree
   with all the known domains, the servers in those domains and the shares
   on the servers.


       Query network nodes by sending requests as broadcasts instead of
       querying the local master browser.

       Only print a list of all the domains known on broadcast or by the
       master browser

       Only print a list of all the domains and servers responding on
       broadcast or known by the master browser.

       level is an integer from 0 to 10. The default value if this
       parameter is not specified is 0.

       The higher this value, the more detail will be logged to the log
       files about the activities of the server. At level 0, only critical
       errors and serious warnings will be logged. Level 1 is a reasonable
       level for day-to-day running - it generates a small amount of
       information about operations carried out.

       Levels above 1 will generate considerable amounts of log data, and
       should only be used when investigating a problem. Levels above 3
       are designed for use only by developers and generate HUGE amounts
       of log data, most of which is extremely cryptic.

       Note that specifying this parameter here will override the log
       level parameter in the smb.conf file.

       Prints the program version number.

   -s|--configfile=<configuration file>
       The file specified contains the configuration details required by
       the server. The information in this file includes server-specific
       information such as what printcap file to use, as well as
       descriptions of all the services that the server is to provide. See
       smb.conf for more information. The default configuration file name
       is determined at compile time.

       Base directory name for log/debug files. The extension ".progname"
       will be appended (e.g. log.smbclient, log.smbd, etc...). The log
       file is never removed by the client.

       Set the smb.conf(5) option "<name>" to value "<value>" from the
       command line. This overrides compiled-in defaults and options read
       from the configuration file.

       If specified, this parameter suppresses the normal password prompt
       from the client to the user. This is useful when accessing a
       service that does not require a password.

       Unless a password is specified on the command line or this
       parameter is specified, the client will request a password.

       If a password is specified on the command line and this option is
       also defined the password on the command line will be silently
       ingnored and no password will be used.

       Try to authenticate with kerberos. Only useful in an Active
       Directory environment.

       Try to use the credentials cached by winbind.

       This option allows you to specify a file from which to read the
       username and password used in the connection. The format of the
       file is

           username = <value>
           password = <value>
           domain   = <value>

       Make certain that the permissions on the file restrict access from
       unwanted users.

       Sets the SMB username or username and password.

       If %password is not specified, the user will be prompted. The
       client will first check the USER environment variable, then the
       LOGNAME variable and if either exists, the string is uppercased. If
       these environmental variables are not found, the username GUEST is

       A third option is to use a credentials file which contains the
       plaintext of the username and password. This option is mainly
       provided for scripts where the admin does not wish to pass the
       credentials on the command line or via environment variables. If
       this method is used, make certain that the permissions on the file
       restrict access from unwanted users. See the -A for more details.

       Be cautious about including passwords in scripts. Also, on many
       systems the command line of a running process may be seen via the
       ps command. To be safe always allow rpcclient to prompt for a
       password and type it in directly.

   -S|--signing on|off|required
       Set the client signing state.

       Use stored machine account password.

       This command line parameter requires the remote server support the
       UNIX extensions or that the SMB3 protocol has been selected.
       Requests that the connection be encrypted. Negotiates SMB
       encryption using either SMB3 or POSIX extensions via GSSAPI. Uses
       the given credentials for the encryption negotiation (either
       kerberos or NTLMv1/v2 if given domain/username/password triple.
       Fails the connection if encryption cannot be negotiated.

       The supplied password is the NT hash.

       Print a summary of command line options.

       Display brief usage message.


   This man page is correct for version 3 of the Samba suite.


   The original Samba software and related utilities were created by
   Andrew Tridgell. Samba is now developed by the Samba Team as an Open
   Source project similar to the way the Linux kernel is developed.

   The smbtree man page was written by Jelmer Vernooij.

More Linux Commands

perlcommunity(1) - a brief overview of the Perl community...
This document aims to provide an overview of the vast perl community, which is far too large and diverse to provide a detailed listing. If any specific niche ha

razor-agents(5) - Collection of files for checking, reportin
Vipuls Razor is a distributed, collaborative, spam detection, reporting, and filtering network. The primary focus of the system is to identify and remove all em

capset(2) - set/get capabilities of thread(s) (Man Page)....
As of Linux 2.2, the power of the superuser (root) has been partitioned into a set of discrete capabilities. Each thread has a set of effective capabilities ide

pcre32_dfa_exec(3) Perl-compatible regular expressions......
This function matches a compiled regular expression against a given subject string, using an alternative matching algorithm that scans the subject string just o

inb(2) - port I/O (System calls - Linux man page)...........
inb.2 - This family of functions is used to do low-level port input and output. The out* functions do port output, the in* functions do port input; the b-suffix

Tcl_DeleteCommandFromToken(3) - implement new commands in C
Tcl_CreateObjCommand defines a new command in interp and associates it with procedure proc such that whenever name is invoked as a Tcl command (e.g., via a call

prctl(1) - Process operations (Commands - Linux man page)...
prctl allows you to query or control certain process behavior. Supported options are: Unaligned memory access: When a process performs an unaligned memory acces

XCheckWindowEvent(3) - select events by type (Man Page).....
The XNextEvent function copies the first event from the event queue into the specified XEvent structure and then removes it from the queue. If the event queue i

CellsOfScreen(3) - screen information functions and macros
The BlackPixelOfScreen macro returns the black pixel value of the specified screen. The WhitePixelOfScreen macro returns the white pixel value of the specified

ecb_crypt(3) - fast DES encryption - Linux manual page......
ecb_crypt() and cbc_crypt() implement the NBS DES (Data Encryption Standard). These routines are faster and more general purpose than crypt(3). They also are ab

git-shell(1) - Restricted login shell for Git-only SSH acces
This is a login shell for SSH accounts to provide restricted Git access. It permits execution only of server-side Git commands implementing the pull/push functi

iso_8859_11(7) - ISO 8859-11 character set encoded in octal,
The ISO 8859 standard includes several 8-bit extensions to the ASCII character set (also known as ISO 646-IRV). ISO 8859-11 encodes the characters used in the T

We can't live, work or learn in freedom unless the software we use is free.