Skip to content

Commit 856a4c7

Browse files
committed
Reference BadTunnel (appropriate for the nat module)
1 parent a84614f commit 856a4c7

File tree

1 file changed

+17
-2
lines changed

1 file changed

+17
-2
lines changed

modules/auxiliary/server/netbios_spoof_nat.rb

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ class MetasploitModule < Msf::Auxiliary
1010

1111
def initialize
1212
super(
13-
'Name' => 'NetBIOS Response Brute Force Spoof (NAT Tunnel)',
13+
'Name' => 'NetBIOS Response "BadTunnel" Brute Force Spoof (NAT Tunnel)',
1414
'Description' => %q{
1515
This module listens for a NetBIOS name request and then continuously spams
1616
NetBIOS responses to a target for given hostname, causing the target to cache
@@ -23,11 +23,17 @@ def initialize
2323
NetBIOS responses will keep the NAT mapping alive after the initial setup. To
2424
trigger the initial NetBIOS request to the Metasploit system, force the target
2525
to access a UNC link pointing to the same address (HTML, Office attachment, etc).
26+
27+
This NAT-piercing issue was named the 'BadTunnel' vulnerability by the discoverer,
28+
Yu Yang (@tombkeeper). The Microsoft patches (MS16-063/MS16-077) impact the way
29+
that the proxy host (WPAD) host is identified, but do change the predictability
30+
of NetBIOS requests.
31+
2632
},
2733
'Authors' => [
2834
'vvalien', # Metasploit Module (post)
2935
'hdm', # Metasploit Module
30-
'tombkeeper' # Related Work
36+
'tombkeeper' # Vulnerability Discovery
3137
],
3238
'License' => MSF_LICENSE,
3339
'Actions' =>
@@ -39,6 +45,15 @@ def initialize
3945
'Service'
4046
],
4147
'DefaultAction' => 'Service',
48+
'References' =>
49+
[
50+
['URL', 'http://xlab.tencent.com/en/2016/06/17/BadTunnel-A-New-Hope/'],
51+
['CVE', '2016-3213'],
52+
['MSB', 'MS16-063'],
53+
['CVE', '2016-3236'],
54+
['MSB', 'MS16-077']
55+
],
56+
'DisclosureDate' => 'Jun 14 2016'
4257
)
4358

4459
register_options(

0 commit comments

Comments
 (0)