New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vmauthd_version & vmauthd_login does not seem to work #13776
Comments
what is the target vmware product and version? edit, esxi 6.5, disregard. |
I'm able to replicate on 6.7u3 for |
Hi! This issue has been left open with no activity for a while now. We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request. |
Is there a workaround for "vmauthd_login"? |
The error above is due to failed SSL/TLS protocol negotiation. You could try different SSL settings such as
As for workarounds, you could try an intermediary SSL/TLS proxy (mitmproxy?). If the vmware authd protocol does not require SSL/TLS then you could try clear text with |
Local OS:
Linux mint 19.03 64bit
Target OS:
ESXI 6.5
Metasploit Version:
Framework: 5.0.95-dev-
Console : 5.0.95-dev-
note: que account, password, ip are correct
Module Error:
msf5 > use auxiliary/scanner/vmware/vmauthd_version
msf5 auxiliary(scanner/vmware/vmauthd_version) > set rhosts 192.168.159.150
msf5 auxiliary(scanner/vmware/vmauthd_version) > set rport 902
msf5 auxiliary(scanner/vmware/vmauthd_version) > run
[] 192.168.159.150:902 - 192.168.159.150:902 Switching to SSL connection...
[] 192.168.159.150:902 - Error: 192.168.159.150: OpenSSL::SSL::SSLError SSL_connect returned=1 errno=0 state=error: no protocols available
[] 192.168.159.150:902 - Scanned 1 of 1 hosts (100% complete)
[] Auxiliary module execution completed
$ tail -f .msf4/logs/framework.log
[06/27/2020 18:37:37] [e(0)] core: Error running against host 192.168.159.150: SSL_connect returned=1 errno=0 state=error: no protocols available
/opt/metasploit-framework/embedded/framework/modules/auxiliary/scanner/vmware/vmauthd_version.rb:107:in
connect' /opt/metasploit-framework/embedded/framework/modules/auxiliary/scanner/vmware/vmauthd_version.rb:107:in
swap_sock_plain_to_ssl'/opt/metasploit-framework/embedded/framework/modules/auxiliary/scanner/vmware/vmauthd_version.rb:57:in
run_host' /opt/metasploit-framework/embedded/framework/lib/msf/core/auxiliary/scanner.rb:117:in
block (2 levels) in run'/opt/metasploit-framework/embedded/framework/lib/msf/core/thread_manager.rb:106:in `block in spawn'
msf5 > use auxiliary/scanner/vmware/vmauthd_login
msf5 auxiliary(scanner/vmware/vmauthd_login) > set rhosts 192.168.159.150
msf5 auxiliary(scanner/vmware/vmauthd_login) > set password admin!@#45
msf5 auxiliary(scanner/vmware/vmauthd_login) > set username root
msf5 auxiliary(scanner/vmware/vmauthd_login) > set rport 902
msf5 auxiliary(scanner/vmware/vmauthd_login) > run
[] 192.168.159.150:902 - 192.168.159.150:902 - Starting bruteforce
[] 192.168.159.150:902 - Error: 192.168.159.150: OpenSSL::SSL::SSLError SSL_connect returned=1 errno=0 state=error: no protocols available
[] 192.168.159.150:902 - Scanned 1 of 1 hosts (100% complete)
[] Auxiliary module execution completed
$ tail -f .msf4/logs/framework.log
[06/27/2020 18:38:54] [e(0)] core: Error running against host 192.168.159.150: SSL_connect returned=1 errno=0 state=error: no protocols available
/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/login_scanner/vmauthd.rb:91:in
connect' /opt/metasploit-framework/embedded/framework/lib/metasploit/framework/login_scanner/vmauthd.rb:91:in
swap_sock_plain_to_ssl'/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/login_scanner/vmauthd.rb:47:in
attempt_login' /opt/metasploit-framework/embedded/framework/lib/metasploit/framework/login_scanner/base.rb:231:in
block in scan!'/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/login_scanner/base.rb:179:in
block in each_credential' /opt/metasploit-framework/embedded/framework/lib/metasploit/framework/credential_collection.rb:121:in
each'/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/login_scanner/base.rb:141:in
each_credential' /opt/metasploit-framework/embedded/framework/lib/metasploit/framework/login_scanner/base.rb:205:in
scan!'/opt/metasploit-framework/embedded/framework/modules/auxiliary/scanner/vmware/vmauthd_login.rb:89:in
run_host' /opt/metasploit-framework/embedded/framework/lib/msf/core/auxiliary/scanner.rb:117:in
block (2 levels) in run'/opt/metasploit-framework/embedded/framework/lib/msf/core/thread_manager.rb:106:in `block in spawn'
The text was updated successfully, but these errors were encountered: