mekhalleh / exchange_proxylogon

Module pack for #ProxyLogon (part. of my contribute for Metasploit-Framework) [CVE-2021-26855 && CVE-2021-27065]
4 stars 3 forks source link

Exploit aborted due to failure: not-found: No Autodiscover information was found #4

Open 13Ragna37 opened 3 years ago

13Ragna37 commented 3 years ago

Hey Hey, can u say my what do i wrong?

if i use manuel the url for autodiscover it works with auth popup :/

[] Started reverse TCP handler on 0.0.0.0:4444 [] Executing automatic check (disable AutoCheck to override) [] Using auxiliary/scanner/http/exchange_proxylogon as check [+] https://192.168.1.2:443 - The target is vulnerable to CVE-2021-26855. [] Scanned 1 of 1 hosts (100% complete) [+] The target is vulnerable. [] https://192.168.1.2:443 - Attempt to exploit for CVE-2021-26855 [] https://192.168.1.2:443 - Retrieving backend FQDN over RPC request [] Internal server name (test-ex01.local) [] https://192.168.1.2:443 - Sending autodiscover request [-] Exploit aborted due to failure: not-found: No Autodiscover information was found [*] Exploit completed, but no session was created.

mekhalleh commented 3 years ago

Hello,

The fully maintained version for this module is landed to Metasploit Framework, you must use this last (https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_proxylogon_rce.rb).

If it does not work, please use set HTTPTRACE true and open an issue on https://github.com/rapid7/metasploit-framework/issues with the trace log.