-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

H D Moore wrote:
> On Monday 22 December 2008, ArcSighter Elite wrote:
>> Excuse me for the one-person chat in here.
>> But let me say that smb_relay of metasploit effectively fails after the
>> patch. We already know that, the curious thing is my python script
>> doesn't.
> 
> What is the difference? NTLMSSP instead of NTLMv2?
> 
> -HD
> 
> _______________________________________________
> Framework-Hackers mailing list
> Framework-Hackers@spool.metasploit.com
> http://spool.metasploit.com/mailman/listinfo/framework-hackers
> 

I don't know yet what the truly difference is in here. But the fact is
what I've posted successfully works against XP SP(2|3) Spanish. We of
course need more testing, but I already known some people qualify what
smb_relay does as SMB to SMB attack; and what I'm doing here is some
sort of HTTP to SMB attack; in where the NTLM negotation is requested by
the (fake) web server with 401 + WWW-Authenticate: NTLM. Then the client
sends me his authorization field in the NTLM-Authorization field. It's a
little of browser based. Of course after that, we got SMB traffic but
who cares?


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJT/tPH+KgkfcIQ8cRAg7zAKDfFdim60dM34k+gDyxjzRT3G41AwCfVsm1
rRfaYBZ6BzOW8ahSg6TGmgk=
=CsHi
-----END PGP SIGNATURE-----
_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to