Jump to content



Recommended Posts

Hello. I am getting the below errors (ppf file) when trying to run this payload. I have version 1.6_305. Impacket is installed (maybe not correctly). Nothing in Loot folder. Any ideas?

Target:            172.16.*.*
Username count:        6
Password count:        14344392
Estimated attempts:    86066352
User-as-Pass Mode:    False
Honey Badger Mode:    False
Verbose:        False
Time:            10:00 AM on July 10, 2019

Ended at:        10:01 AM on July 10, 2019

Traceback (most recent call last):
  File "/root/udisk/payloads/switch1/mmcbrute/mmcbrute.py", line 185, in <module>
  File "/root/udisk/payloads/switch1/mmcbrute/mmcbrute.py", line 76, in run
    smb_connection = SMBConnection(self.target, self.target)
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 74, in __init__
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 111, in negotiateSession
    self._timeout, True, flags1=flags1, flags2=flags2, data=negoData)
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 159, in _negotiateSession
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 833, in __init__
    timeout=timeout, local_type=local_type, sock=sock)
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 705, in __init__
    self._sock = self._setup_connection((remote_host, sess_port), timeout)
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 844, in _setup_connection
    raise socket.error("Connection error (%s:%s)" % (peer[0], peer[1]), e)
socket.error: [Errno Connection error (] timed out

Link to comment
Share on other sites

  • 2 weeks later...

As indicated "mmcbrute" could not connect to host "" on port "445".

That's actually a weird error since the Target IP Address is being obtained automatically from BB's DHCP server



Debug: Try to make sure:

1. That that target already got this IP address "" from BB DHCP server's IP pool, if not, then there is something wrong!

2. The target has no firewall activated, if so, BB won't be able to reach port 445 to perform the brute-force attack!


Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...