GroovenReuven Posted August 16, 2019 Share Posted August 16, 2019 Hello. I am getting the below errors (ppf file) when trying to run this payload. I have version 1.6_305. Impacket is installed (maybe not correctly). Nothing in Loot folder. Any ideas? Target: 172.16.*.* Username count: 6 Password count: 14344392 Estimated attempts: 86066352 User-as-Pass Mode: False Honey Badger Mode: False Verbose: False Time: 10:00 AM on July 10, 2019 Ended at: 10:01 AM on July 10, 2019 Traceback (most recent call last): File "/root/udisk/payloads/switch1/mmcbrute/mmcbrute.py", line 185, in <module> brute.run() File "/root/udisk/payloads/switch1/mmcbrute/mmcbrute.py", line 76, in run smb_connection = SMBConnection(self.target, self.target) File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 74, in __init__ self.negotiateSession(preferredDialect) File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 111, in negotiateSession self._timeout, True, flags1=flags1, flags2=flags2, data=negoData) File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 159, in _negotiateSession timeout) File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 833, in __init__ timeout=timeout, local_type=local_type, sock=sock) File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 705, in __init__ self._sock = self._setup_connection((remote_host, sess_port), timeout) File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 844, in _setup_connection raise socket.error("Connection error (%s:%s)" % (peer[0], peer[1]), e) socket.error: [Errno Connection error (172.16.64.10:445)] timed out Quote Link to comment Share on other sites More sharing options...
Mohamed A. Baset Posted August 25, 2019 Share Posted August 25, 2019 As indicated "mmcbrute" could not connect to host "172.16.64.10" on port "445". That's actually a weird error since the Target IP Address is being obtained automatically from BB's DHCP server Quote "GET TARGET_IP" Debug: Try to make sure: 1. That that target already got this IP address "172.16.64.10" from BB DHCP server's IP pool, if not, then there is something wrong! 2. The target has no firewall activated, if so, BB won't be able to reach port 445 to perform the brute-force attack! Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.