-
Notifications
You must be signed in to change notification settings - Fork 14k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
smb_relay psexec action fails to get session, even when authenticated as Domain Admin #19673
Comments
Does the regular PSExec module work? If not, have you disabled Remote UAC. That'll trigger a STATUS_ACCESS_DENIED error IIRC. |
Regular psexec works just fine:
|
Also, for what it is worth, I can get an smb session with the relay module just fine. |
Hmm the plot thickens... What if you try the |
Psexec does not work with the smb_session
|
I'm actually seeing almost nothing working. The SMB session is "established"; but even basic tasks like enumerating pipes comes back with ACCESS_DENIED. |
Does the host you're targeting definitely have SMB signing disabled? I see this behaviour on hosts with SMB signing enabled. Really, the module should warn/fail if it's enabled, rather than claiming it's succeeded but never achieving anything. |
I appear to be authenticating just fine, but then get
ACCESS_DENIED
when using the psexec action.=[ metasploit v6.4.38-dev-d5b71aa581 ]
The text was updated successfully, but these errors were encountered: