You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The problem seems to be related to sp_nego at smb.lua:1368, which is overiding the hash_type.
if ( sp_nego ) then
if (smb['domain'] or smb['server']) and (not domain or #domain == 0) then
domain = smb['domain'] or smb['server']
end
**hash_type = "ntlm"**
end
Expected behavior
Nmap should use the authentification parameter specified in smbtype.
Nmap should try by default all the authentication method (v1, lmv1, ntlmv1, v2, lmv2,ntlmv2_session).
Version info (please complete the following information):
Tested on Centos and Kali.
OS:
Linux kali 5.9.0-kali5-amd64 #1 SMP Debian 5.9.15-1kali1 (2020-12-18)
Linux host 3.10.0-862.3.2.el7.x86_64
Hi,
Describe the bug
When using NSE scripts which use smbauth, providing an smbtype argument appears to be tossed in favor of "ntlm"
Login Failure
-dd during auth :
Logging success
By fixing it
-dd during auth :
The problem seems to be related to sp_nego at smb.lua:1368, which is overiding the hash_type.
Expected behavior
Nmap should use the authentification parameter specified in smbtype.
Nmap should try by default all the authentication method (v1, lmv1, ntlmv1, v2, lmv2,ntlmv2_session).
Version info (please complete the following information):
Tested on Centos and Kali.
nmap --version
:Here is my debug code,
This might not be the best way to debug lua :D, I can't find how to include it as a patch...
The text was updated successfully, but these errors were encountered: