From 7e4e6e643703c6b0a34721ef0de8b4254fb7ebf6 Mon Sep 17 00:00:00 2001 From: William Vu Date: Tue, 27 Mar 2018 14:32:21 -0500 Subject: [PATCH] Update ms17_010_{psexec,command} module docs --- .../modules/auxiliary/admin/smb/ms17_010_command.md | 5 +++++ documentation/modules/exploit/windows/smb/ms17_010_psexec.md | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/documentation/modules/auxiliary/admin/smb/ms17_010_command.md b/documentation/modules/auxiliary/admin/smb/ms17_010_command.md index f02caea6cc..1d22825109 100644 --- a/documentation/modules/auxiliary/admin/smb/ms17_010_command.md +++ b/documentation/modules/auxiliary/admin/smb/ms17_010_command.md @@ -21,6 +21,11 @@ To be able to use auxiliary/admin/smb/ms17_010_command: You can check all of these with the SMB MS17-010 and Pipe Auditor auxiliary scanner modules. +If you're having trouble configuring an anonymous named pipe, +Microsoft's +[documentation](https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously) +on the topic may be helpful. + ## Verification Steps At the minimum, you should be able use psexec to get a session with a valid credential using the following: diff --git a/documentation/modules/exploit/windows/smb/ms17_010_psexec.md b/documentation/modules/exploit/windows/smb/ms17_010_psexec.md index 67889ddaf0..a83eb89c12 100644 --- a/documentation/modules/exploit/windows/smb/ms17_010_psexec.md +++ b/documentation/modules/exploit/windows/smb/ms17_010_psexec.md @@ -19,6 +19,11 @@ To be able to use exploit/windows/smb/ms17_010_psexec: You can check all of these with the SMB MS17-010 and Pipe Auditor auxiliary scanner modules. +If you're having trouble configuring an anonymous named pipe, +Microsoft's +[documentation](https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously) +on the topic may be helpful. + ## Verification Steps At the minimum, you should be able use psexec to get a session with a valid credential using the following: