New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SMB SessionError: STATUS_OBJECT_NAME_NOT_FOUND(The object name is not found.) #6
Comments
This could indicate that AV stopped the command execution. Had the same issue today, worked after disabling Defender. |
Strange, because my AV was also disabled. I will retry soon, and I send back my feedback. |
Today, I have tried once again but I still get this error. Maybe it's not the AV who created the issue ? @csandker |
Hey @archidote, sorry for the late reply (not my repo, just trying to support here). First of all this exploit uses impacket's smbexec to execute commands when the Lines 143 to 152 in 152a315
With that being said there are two routes you can go from here:
If you prefer to stick to strategy 1 (aka "dig into the matter"), here's what you could do.
If you're happy to leave the "shell the target in a single line" path, I'd recommend you use this exploit to get a service ticket and start looking into how to use this with one of impacket's examples. Ì'd start with using If really anything fails, I would:
If nothing else I hope this at least helps getting some steps forward. |
Thank's for your answser, I will explore all the way that you have mentioned above. |
Hi, So I found the problem after deep investiguations. I thinked that I turned off all the security assessments like firewall,defender etc. But in a sub sub menu, "Real time protection" was checked. As you can imagin, when I unchecked this asset, noPac.py run perfectly, and I got a shell. Finally, My Windows Server 2022 datacenter .iso was released in october (I verified the build number : 20348.288), So CVE-2021-42278 was already patched...That's why I need to turned off all of security assessments it's all my fault, computer science won again ^^ But If I use the scanner.py everything works as well I want. ^^ ++ |
I tried same Impacket v0.10.0
in my case command
|
I solved I had to turn of AV detection on windows 11 server. |
Hello, I got this error when I try to execute this command :
python3 noPac.py lgds.local/alex.henry:'123+aze' -dc-ip 192.168.130.100 -dc-host dc -shell --impersonate root2 -use-ldap
target system : Windows Server 2022 (Sept 2021)
Strange, because I have a smb share on this target lab.
Have you any idea to resolv this issue ?
Best regards,
The text was updated successfully, but these errors were encountered: