Metasploit mailing list archives
smb_login auxiliary module
From: alfonso.caponi at gmail.com (alfonso caponi)
Date: Fri, 6 Feb 2009 22:04:58 +0100
Hi,
I've a problem with smb_login module. A test:
C:\Documents and Settings\al>net use \\192.168.1.91\IPC$ /user:test test
The command completed successfully.
msf auxiliary(smb_login) > show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS 192.168.1.91 yes The target address range or CIDR
identifier
RPORT 139 yes Set the SMB service port
SMBDomain MYGROUP no SMB Domain
SMBName SERVICE no SMB Name
SMBPass root no SMB Password
SMBUser root no SMB Username
THREADS 1 yes The number of concurrent threads
msf auxiliary(smb_login) > exploit
[*] Trying to login to 192.168.1.91...
[*] Error: 192.168.1.91: Login Failed: Broken pipe
[*] Auxiliary module execution completed
I've added two lines:
OptString.new('SMBName', [ false, "SMB Name", '']),
OptString.new('SMBDomain', [ false, "SMB Domain", '']),
Is there a debug/verbose options?
Thank you very much,
AL
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090206/44852831/attachment.htm>
Current thread:
- smb_login auxiliary module alfonso caponi (Feb 06)
