Skip to content

Commit 9e3b1ca

Browse files
committed
automatic module_metadata_base.json update
1 parent 67ea2bc commit 9e3b1ca

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

db/modules_metadata_base.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49779,7 +49779,7 @@
4977949779
"agalway-r7",
4978049780
"sjanusz-r7"
4978149781
],
49782-
"description": "This module provides a SMB service that can be used to capture the challenge-response\n password NTLMv1 & NTLMv2 hashes used with SMB1, SMB2, or SMB3 client systems.\n Responses sent by this service have by default a random 8 byte challenge string\n of format `\\x11\\x22\\x33\\x44\\x55\\x66\\x77\\x88`, allowing for easy cracking using\n Cain & Abel (NTLMv1) or John the ripper (with jumbo patch).\n\n To exploit this, the target system must try to authenticate to this\n module. One way to force an SMB authentication attempt is by embedding\n a UNC path (\\\\SERVER\\SHARE) into a web page or email message. When\n the victim views the web page or email, their system will\n automatically connect to the server specified in the UNC share (the IP\n address of the system running this module) and attempt to\n authenticate. Another option is using auxiliary/spoof/{nbns,llmnr} to\n respond to queries for names the victim is already looking for.\n\n Documentation of the above spoofing methods can be found by running `info -d`.",
49782+
"description": "This module provides a SMB service that can be used to capture the challenge-response\n password NTLMv1 & NTLMv2 hashes used with SMB1, SMB2, or SMB3 client systems.\n Responses sent by this service by default use a random 8 byte challenge string.\n A specific value (such as `1122334455667788`) can be set using the CHALLENGE option,\n allowing for easy cracking using Cain & Abel (NTLMv1) or John the Ripper\n (with jumbo patch).\n\n To exploit this, the target system must try to authenticate to this\n module. One way to force an SMB authentication attempt is by embedding\n a UNC path (\\\\SERVER\\SHARE) into a web page or email message. When\n the victim views the web page or email, their system will\n automatically connect to the server specified in the UNC share (the IP\n address of the system running this module) and attempt to\n authenticate. Another option is using auxiliary/spoof/{nbns,llmnr} to\n respond to queries for names the victim is already looking for.\n\n Documentation of the above spoofing methods can be found by running `info -d`.",
4978349783
"references": [
4978449784

4978549785
],
@@ -49793,7 +49793,7 @@
4979349793

4979449794
],
4979549795
"targets": null,
49796-
"mod_time": "2022-04-21 11:24:15 +0000",
49796+
"mod_time": "2022-05-27 14:41:06 +0000",
4979749797
"path": "/modules/auxiliary/server/capture/smb.rb",
4979849798
"is_install_path": true,
4979949799
"ref_name": "server/capture/smb",

0 commit comments

Comments
 (0)