rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.15k stars 13.97k forks source link

modules/exploits/windows/smb/smb_relay NTLM v1 / SMB1 Support #16261

Closed adfoster-r7 closed 1 year ago

adfoster-r7 commented 2 years ago

Metasploit's modules/exploits/windows/smb/smb_relay.rb module will no longer support NTLM V1 / SMB1 after https://github.com/rapid7/metasploit-framework/pull/16098 is merged in - which updates the module to support SMB2/SMB3.

Users will currently see the following error:

msf6 exploit(windows/smb/smb_relay) > [!] Cannot relay request from 192.168.123.26. The SMB1 SMB_COM_SESSION_SETUP_ANDX command is not supported - https://github.com/rapid7/metasploit-framework/issues/16261

This is a placeholder ticket to request add support for this functionality.

adfoster-r7 commented 2 years ago

If this impacts you, please react or comment with additional details to whichever guide/tutorial you were following, or if it's an issue you've ran into within a real pentesting environment just let us know :+1:

github-actions[bot] commented 1 year ago

Thanks for your contribution to Metasploit Framework! We've looked at this issue, and unfortunately we do not currently have the bandwidth to prioritize this issue.

We've labeled this as attic and closed it for now. If you believe this issue has been closed in error, or that it should be prioritized, please comment with additional information.