Metasploit mailing list archives

problems with scanner/smb/smb_login


From: Nik <foringer () gmail com>
Date: Tue, 6 Sep 2011 16:56:42 +0400

Hello list!

I'm having some problems with auxiliary/scanner/smb/smb_login module.
It simply doesn't work for me and I cannot understand the reason.

In my environment attacker machine is BackTrack5, target - windows XP
sp2 eng. Password for Administrator account is 'network'.

msf  auxiliary(smb_login) > set rhosts 172.16.10.10
rhosts => 172.16.10.10
msf  auxiliary(smb_login) > set SMBPass network
SMBPass => network
msf  auxiliary(smb_login) > set SMBUser Administrator
SMBUser => Administrator
msf  auxiliary(smb_login) > run

[*] 172.16.10.10:445 SMB - Starting SMB login bruteforce
[*] 172.16.10.10 - GUEST LOGIN (Windows 5.1) Administrator :
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf  auxiliary(smb_login) >

Same thing happens when I'm using USERPASS_FILE with values:

Administrator network

There is no firewall between computers and network shares are
definitely opened on the target machine, as smbclient works like a
charm:

# smbclient -L \\\\172.16.10.10 -U'Administrator'
Enter Administrator's password:
session request to 172.16.10.10 failed (Called name not present)
Domain=[WINXP] OS=[Windows 5.1] Server=[Windows 2000 LAN Manager]

        Sharename       Type      Comment
        ---------       ----      -------
        IPC$            IPC       Remote IPC
        share           Disk
        ADMIN$          Disk      Remote Admin
        C$              Disk      Default share
session request to 172.16.10.10 failed (Called name not present)
session request to 172 failed (Called name not present)
Domain=[WINXP] OS=[Windows 5.1] Server=[Windows 2000 LAN Manager]

        Server               Comment
        ---------            -------

        Workgroup            Master
        ---------            -------


I appreciate for your help, and thank you very much for the great product!
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: