[*] Connected to the database specified in the YAML file
[*] Connected to msf. Connection type: postgresql. Connection name: OYGIkFxA.
[*] Deleted workspace: default
[*] Recreated the default workspace
VERBOSE => true
RHOSTS => 10.0.0.10
LHOST => tap0
msf >
msf > use auxiliary/scanner/smb/smb_lookupsid
[*] Setting default action LOCAL - view all 2 actions with the show actions command
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf auxiliary(scanner/smb/smb_lookupsid) >
msf auxiliary(scanner/smb/smb_lookupsid) > options
Module options (auxiliary/scanner/smb/smb_lookupsid):
Name Current Setting Required Description
---- --------------- -------- -----------
MaxRID 4000 no Maximum RID to check
MinRID 500 no Starting RID to check
Used when connecting via an existing SESSION:
Name Current Setting Required Description
---- --------------- -------- -----------
SESSION no The session to run this module on
Used when making a new connection via RHOSTS:
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS 10.0.0.10 no The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 445 no The target port (TCP)
SMBDomain . no The Windows domain to use for authentication
SMBPass no The password for the specified username
SMBUser no The username to authenticate as
THREADS 1 yes The number of concurrent threads (max one per host)
Auxiliary action:
Name Description
---- -----------
LOCAL Enumerate local accounts
View the full module info with the info, or info -d command.
msf auxiliary(scanner/smb/smb_lookupsid) >
msf auxiliary(scanner/smb/smb_lookupsid) > run
[*] 10.0.0.10:445 - Connecting to Local Security Authority (LSA) Remote Protocol
[-] 10.0.0.10:445 - Error: RubySMB::Error::UnexpectedStatusCode The server responded with an unexpected status code: STATUS_OBJECT_NAME_NOT_FOUND
[-] 10.0.0.10: - Auxiliary failed: NoMethodError undefined method `each' for an instance of String
[-] 10.0.0.10: - Call stack:
[-] 10.0.0.10: - /usr/share/metasploit-framework2/modules/auxiliary/scanner/smb/smb_lookupsid.rb:180:in `block in format_results'
[-] 10.0.0.10: - /usr/share/metasploit-framework2/modules/auxiliary/scanner/smb/smb_lookupsid.rb:179:in `each'
[-] 10.0.0.10: - /usr/share/metasploit-framework2/modules/auxiliary/scanner/smb/smb_lookupsid.rb:179:in `format_results'
[-] 10.0.0.10: - /usr/share/metasploit-framework2/modules/auxiliary/scanner/smb/smb_lookupsid.rb:195:in `run_host'
[-] 10.0.0.10: - /usr/share/metasploit-framework2/lib/msf/core/auxiliary/scanner.rb:116:in `block (2 levels) in run'
[-] 10.0.0.10: - /usr/share/metasploit-framework2/lib/msf/core/thread_manager.rb:105:in `block in spawn'
[*] Auxiliary module execution completed
msf auxiliary(scanner/smb/smb_lookupsid) >