@@ -10,7 +10,7 @@ class MetasploitModule < Msf::Auxiliary
10
10
11
11
def initialize
12
12
super (
13
- 'Name' => 'NetBIOS Response Brute Force Spoof (NAT Tunnel)' ,
13
+ 'Name' => 'NetBIOS Response "BadTunnel" Brute Force Spoof (NAT Tunnel)' ,
14
14
'Description' => %q{
15
15
This module listens for a NetBIOS name request and then continuously spams
16
16
NetBIOS responses to a target for given hostname, causing the target to cache
@@ -23,11 +23,17 @@ def initialize
23
23
NetBIOS responses will keep the NAT mapping alive after the initial setup. To
24
24
trigger the initial NetBIOS request to the Metasploit system, force the target
25
25
to access a UNC link pointing to the same address (HTML, Office attachment, etc).
26
+
27
+ This NAT-piercing issue was named the 'BadTunnel' vulnerability by the discoverer,
28
+ Yu Yang (@tombkeeper). The Microsoft patches (MS16-063/MS16-077) impact the way
29
+ that the proxy host (WPAD) host is identified, but do change the predictability
30
+ of NetBIOS requests.
31
+
26
32
} ,
27
33
'Authors' => [
28
34
'vvalien' , # Metasploit Module (post)
29
35
'hdm' , # Metasploit Module
30
- 'tombkeeper' # Related Work
36
+ 'tombkeeper' # Vulnerability Discovery
31
37
] ,
32
38
'License' => MSF_LICENSE ,
33
39
'Actions' =>
@@ -39,6 +45,15 @@ def initialize
39
45
'Service'
40
46
] ,
41
47
'DefaultAction' => 'Service' ,
48
+ 'References' =>
49
+ [
50
+ [ 'URL' , 'http://xlab.tencent.com/en/2016/06/17/BadTunnel-A-New-Hope/' ] ,
51
+ [ 'CVE' , '2016-3213' ] ,
52
+ [ 'MSB' , 'MS16-063' ] ,
53
+ [ 'CVE' , '2016-3236' ] ,
54
+ [ 'MSB' , 'MS16-077' ]
55
+ ] ,
56
+ 'DisclosureDate' => 'Jun 14 2016'
42
57
)
43
58
44
59
register_options (
0 commit comments