Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Failure When OpenSSL Does Not Provide An Algorithm #228

Open
zeroSteiner opened this issue May 19, 2022 · 0 comments
Open

Failure When OpenSSL Does Not Provide An Algorithm #228

zeroSteiner opened this issue May 19, 2022 · 0 comments

Comments

@zeroSteiner
Copy link
Contributor

Right now RubySMB assumes that the loaded version of OpenSSL provides all of the used encryption algorithms. It will proceed with negotiation ignoring what algorithms it can actually use.

RubySMB should be updated to provide a subset of encryption algorithms based on what OpenSSL is capable of providing. We should likely throw an exception if encryption is explicitly required but OpenSSL offers no usable algorithms. Once this issue is addressed, we'll also want to make sure that Metasploit's smb_version module continues to enumerate all possible algorithms regardless of what OpenSSL offers since that process doesn't require any of them to actually be used.

Originally reported as an error manifesting itself by way of a psexec failure.

msf6 exploit(windows/smb/psexec) > run

[*] 192.168.222.151:445 - Connecting to the server...
[*] 192.168.222.151:445 - Authenticating to 192.168.222.151:445 as user 'vagrant'...
[-] 192.168.222.151:445 - Exploit failed: RuntimeError unsupported cipher algorithm (AES-128-GCM)
[*] Exploit completed, but no session was created.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant