Metasploit mailing list archives

smb_login auxiliary module


From: alfonso.caponi at gmail.com (alfonso caponi)
Date: Fri, 6 Feb 2009 22:04:58 +0100

Hi,

I've a problem with smb_login module. A test:

C:\Documents and Settings\al>net use \\192.168.1.91\IPC$ /user:test test
The command completed successfully.



msf auxiliary(smb_login) > show options

Module options:

   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   RHOSTS     192.168.1.91    yes       The target address range or CIDR
identifier
   RPORT      139              yes       Set the SMB service port
   SMBDomain  MYGROUP          no        SMB Domain
   SMBName    SERVICE       no        SMB Name
   SMBPass    root             no        SMB Password
   SMBUser    root             no        SMB Username
   THREADS    1                yes       The number of concurrent threads

msf auxiliary(smb_login) > exploit

[*] Trying to login to 192.168.1.91...
[*] Error: 192.168.1.91: Login Failed: Broken pipe
[*] Auxiliary module execution completed



I've added two lines:

OptString.new('SMBName', [ false, "SMB Name", '']),
OptString.new('SMBDomain', [ false, "SMB Domain", '']),

Is there a debug/verbose options?

Thank you very much,
AL
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090206/44852831/attachment.htm>


Current thread: