Skip to content

Commit 1466506

Browse files
committed
Update the docs to be accurate
1 parent a47b3fe commit 1466506

File tree

2 files changed

+6
-3
lines changed
  • documentation/modules/auxiliary/server/capture
  • modules/auxiliary/server/capture

2 files changed

+6
-3
lines changed

documentation/modules/auxiliary/server/capture/smb.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@ A file to store Cain & Abel formatted captured hashes in. Only supports NTLMv1 H
2626

2727
The 8 byte server challenge. If unset or not a valid 16 character hexadecimal pattern, a random challenge is used instead.
2828

29+
The format is `1122334455667788`.
30+
2931
**JOHNPWFILE**
3032

3133
A file to store John the Ripper formatted hashes in. NTLMv1 and NTLMv2 hashes will be stored in separate files.

modules/auxiliary/server/capture/smb.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,10 @@ def initialize
1717
'Description' => %q{
1818
This module provides a SMB service that can be used to capture the challenge-response
1919
password NTLMv1 & NTLMv2 hashes used with SMB1, SMB2, or SMB3 client systems.
20-
Responses sent by this service have by default a random 8 byte challenge string
21-
of format `\x11\x22\x33\x44\x55\x66\x77\x88`, allowing for easy cracking using
22-
Cain & Abel (NTLMv1) or John the ripper (with jumbo patch).
20+
Responses sent by this service by default use a random 8 byte challenge string.
21+
A specific value (such as `1122334455667788`) can be set using the CHALLENGE option,
22+
allowing for easy cracking using Cain & Abel (NTLMv1) or John the Ripper
23+
(with jumbo patch).
2324
2425
To exploit this, the target system must try to authenticate to this
2526
module. One way to force an SMB authentication attempt is by embedding

0 commit comments

Comments
 (0)