Jump to content

SMBruteBunny


GroovenReuven

Recommended Posts

Hello. I am getting the below errors (ppf file) when trying to run this payload. I have version 1.6_305. Impacket is installed (maybe not correctly). Nothing in Loot folder. Any ideas?

Target:            172.16.*.*
Username count:        6
Password count:        14344392
Estimated attempts:    86066352
User-as-Pass Mode:    False
Honey Badger Mode:    False
Verbose:        False
Time:            10:00 AM on July 10, 2019


Ended at:        10:01 AM on July 10, 2019

Traceback (most recent call last):
  File "/root/udisk/payloads/switch1/mmcbrute/mmcbrute.py", line 185, in <module>
    brute.run()
  File "/root/udisk/payloads/switch1/mmcbrute/mmcbrute.py", line 76, in run
    smb_connection = SMBConnection(self.target, self.target)
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 74, in __init__
    self.negotiateSession(preferredDialect)
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 111, in negotiateSession
    self._timeout, True, flags1=flags1, flags2=flags2, data=negoData)
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 159, in _negotiateSession
    timeout)
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 833, in __init__
    timeout=timeout, local_type=local_type, sock=sock)
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 705, in __init__
    self._sock = self._setup_connection((remote_host, sess_port), timeout)
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 844, in _setup_connection
    raise socket.error("Connection error (%s:%s)" % (peer[0], peer[1]), e)
socket.error: [Errno Connection error (172.16.64.10:445)] timed out

Link to comment
Share on other sites

  • 2 weeks later...

As indicated "mmcbrute" could not connect to host "172.16.64.10" on port "445".
 

That's actually a weird error since the Target IP Address is being obtained automatically from BB's DHCP server
 

Quote

"GET TARGET_IP"


Debug: Try to make sure:

1. That that target already got this IP address "172.16.64.10" from BB DHCP server's IP pool, if not, then there is something wrong!

2. The target has no firewall activated, if so, BB won't be able to reach port 445 to perform the brute-force attack!


 

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...