Closed bcoles closed 2 years ago
Hey @bcoles , I would like to work on this issue! May I?
Hey @bcoles , I would like to work on this issue! May I?
All yours.
Update :
I am working on tracing the call to the exception in the libraries.
I feel there is a not a check on NULL parameters (user and pass) in the exception; but there is a check on empty string parameters.
I am trying to get it fixed soon. :D
Update @bcoles
Hey, I have fixed the bug, by manually going through the call stacks.
Now we don't get this error message if we unset the smbuser and smbpass then run.
Log:
msf6 exploit(windows/smb/ms07_029_msdns_zonename) > unset smbuser
Unsetting smbuser...
msf6 exploit(windows/smb/ms07_029_msdns_zonename) > unset smbpass
Unsetting smbpass...
msf6 exploit(windows/smb/ms07_029_msdns_zonename) > run
[*] Started reverse TCP handler on 192.168.1.105:4444
[*] 192.168.1.103:445 - Unknown OS: Windows 7 Professional 7601 Service Pack 1
[*] Exploit completed, but no session was created.
Now, I just have to confirm this by using the debugger call stacks and then create a PR with a unit test written.
It was amazing :D
Hey, its my exam week going on.. I am seriously doing this PR the first thing after this weekend..
Really sorry for the delay :(
Hey, its my exam week going on.. I am seriously doing this PR the first thing after this weekend.. Really sorry for the delay :(
No worries. Good luck :)
hey @bcoles , thank you so much for your wishes :) ..
Finally I did a PR.. you can check it out in your time :D
Reproduce:
use
a module which uses SMBunset smbuser
unset smbpass
run
Log:
The failure is unavoidable, but the error message is obtuse. The correct error message can be restored by setting
smbuser
andsmbpass
to empty strings.