module
Microsoft Windows SMB to MSSQL Relay
| Disclosed |
|---|
| N/A |
Disclosed
N/A
Description
This module supports running an SMB server which validates credentials, and then attempts to execute a relay
attack against an MSSQL server on the configured RHOSTS hosts.
If the relay succeeds, an MSSQL session to the target will be created. This can be used by any modules that
support MSSQL sessions, like `admin/mssql/mssql_enum`. The session can also be used to run arbitrary queries.
Supports SMBv2, SMBv3, and captures NTLMv1 as well as NTLMv2 hashes.
SMBv1 is not supported - please see https://github.com/rapid7/metasploit-framework/issues/16261
attack against an MSSQL server on the configured RHOSTS hosts.
If the relay succeeds, an MSSQL session to the target will be created. This can be used by any modules that
support MSSQL sessions, like `admin/mssql/mssql_enum`. The session can also be used to run arbitrary queries.
Supports SMBv2, SMBv3, and captures NTLMv1 as well as NTLMv2 hashes.
SMBv1 is not supported - please see https://github.com/rapid7/metasploit-framework/issues/16261
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.