Jump to content



Recommended Posts

Hello. I am getting the below errors (ppf file) when trying to run this payload. I have version 1.6_305. Impacket is installed (maybe not correctly). Nothing in Loot folder. Any ideas?

Target:            172.16.*.*
Username count:        6
Password count:        14344392
Estimated attempts:    86066352
User-as-Pass Mode:    False
Honey Badger Mode:    False
Verbose:        False
Time:            10:00 AM on July 10, 2019

Ended at:        10:01 AM on July 10, 2019

Traceback (most recent call last):
  File "/root/udisk/payloads/switch1/mmcbrute/mmcbrute.py", line 185, in <module>
  File "/root/udisk/payloads/switch1/mmcbrute/mmcbrute.py", line 76, in run
    smb_connection = SMBConnection(self.target, self.target)
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 74, in __init__
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 111, in negotiateSession
    self._timeout, True, flags1=flags1, flags2=flags2, data=negoData)
  File "/usr/local/lib/python2.7/dist-packages/impacket/smbconnection.py", line 159, in _negotiateSession
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 833, in __init__
    timeout=timeout, local_type=local_type, sock=sock)
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 705, in __init__
    self._sock = self._setup_connection((remote_host, sess_port), timeout)
  File "/usr/local/lib/python2.7/dist-packages/impacket/nmb.py", line 844, in _setup_connection
    raise socket.error("Connection error (%s:%s)" % (peer[0], peer[1]), e)
socket.error: [Errno Connection error (] timed out

Link to comment
Share on other sites

  • 2 weeks later...

As indicated "mmcbrute" could not connect to host "" on port "445".

That's actually a weird error since the Target IP Address is being obtained automatically from BB's DHCP server



Debug: Try to make sure:

1. That that target already got this IP address "" from BB DHCP server's IP pool, if not, then there is something wrong!

2. The target has no firewall activated, if so, BB won't be able to reach port 445 to perform the brute-force attack!


Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...