Closed id2746 closed 1 month ago
If guest session is allowed, if you authenticate using any unknown domain user, you will get a valid authentication tho. Can you try the same thing but for a valid domain user ? Otherwise it doesn't make sense to bruteforce unknown users
this case is not from my network)))
if i use cme, its look like this:
└─$ cme smb ip.txt -u user -p brut/top20admin.txt --continue-on-success
SMB 192.168.1.12 445 BUH1 [] Windows 10 Pro 19045 x64 (name:BUH1) (domain:Buh1) (signing:False) (SMBv1:True)
SMB 192.168.1.10 445 BUH [] Windows 10 Pro 19045 x64 (name:BUH) (domain:Buh) (signing:False) (SMBv1:True)
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:admin
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:123456
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:12345678
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:1234
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:Password
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:123
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:12345
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:admin123
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:123456789
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:adminisp
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:demo
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:root
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:123123
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:admin@123
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:123456aA@
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:01031974
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:Admin@123
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:111111
SMB 192.168.1.12 445 BUH1 [+] Buh1\user:admin1234
Ah yeah I got your point! Taking a look at it :)
@mpgn looks like it's related to this https://github.com/byt3bl33d3r/CrackMapExec/issues/321
I have got the same issue without the guest thing:
Apparently you issued a patch because continue-on-success wasn't working on servers with smb signing enabled ?
if you have only one user and a password is found, why you want to continue to bf ? the feature is useful if you have multiple users
Yeah I agree xD So going back to what I said before. There is no issue, if guest is enabled, authentication will always be valid so nxc stops.
Adding to the discussion:
Nxc removes users with a correct password from the queue, even if --continue-on-success
is enabled because:
Fyi this feature was not implemented back in CME (at least the kali version), that is why you see the different behaviour. Add another user to the queue and you will see the result:
the point is that the user "User" is valid, but because of the guest session enabled, I can't brute force it. How should I be in such a case? That is why I cited the case from CME as an example
Are you sure you are authenticating against the correct domain? If the user exists in the domain you should get a failed login (as you can see in my screenshot).
In your screenshot it looks like you found the user for the domain "Buh" but in the cme output you are authenticating against the "Buh1" domain.
These look like local users. If you want to bruteforce local users, add the --local-auth. Otherwise disable the guest domain user and guest local accounts
If there still is something unclear feel free to reopen or hit us up on discord
Describe the bug --continue-on-success option isn't working. If guest session is enabled, brutforce is spopping on first password
To Reproduce Steps to reproduce the behavior i.e.: Command:
nxc smb ip.txt -u User -p brut/top20admin.txt --continue-on-success
Resulted in: