Metasploit mailing list archives
smb_login auxiliary module
From: alfonso.caponi at gmail.com (alfonso caponi)
Date: Fri, 6 Feb 2009 22:04:58 +0100
Hi, I've a problem with smb_login module. A test: C:\Documents and Settings\al>net use \\192.168.1.91\IPC$ /user:test test The command completed successfully. msf auxiliary(smb_login) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- RHOSTS 192.168.1.91 yes The target address range or CIDR identifier RPORT 139 yes Set the SMB service port SMBDomain MYGROUP no SMB Domain SMBName SERVICE no SMB Name SMBPass root no SMB Password SMBUser root no SMB Username THREADS 1 yes The number of concurrent threads msf auxiliary(smb_login) > exploit [*] Trying to login to 192.168.1.91... [*] Error: 192.168.1.91: Login Failed: Broken pipe [*] Auxiliary module execution completed I've added two lines: OptString.new('SMBName', [ false, "SMB Name", '']), OptString.new('SMBDomain', [ false, "SMB Domain", '']), Is there a debug/verbose options? Thank you very much, AL -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090206/44852831/attachment.htm>
Current thread:
- smb_login auxiliary module alfonso caponi (Feb 06)