Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ERROR]: all children were disabled due too many connection errors 0 of 1 target completed, 0 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2024-04-19 09:10:34 #944

Open
Kaakjeking opened this issue Apr 19, 2024 · 4 comments

Comments

@Kaakjeking
Copy link

it keeps saying connection error i tried everything the command was: sudo hydra -l Minifreek1 -p /home/USER/Downloads/archive.zip/rockyou.txt 128.116.21.4 -s 49152 https-post-form "/login:username=^USER^&password=^PASS^:F=<form name='login'" -t 32 -vV
for privacy reasons that you dont hack me i used "USER" instead of my linux account

@xmehulx
Copy link

xmehulx commented Jul 16, 2024

Did you try seeing the debug messages with -d [optional debug level] flag or the packet capture? It might help understanding if the issue is in Hydra or the server has some defence mechanism set.

@Donvai123
Copy link

me also facing the same issue,please help

@touchinglie
Copy link

[DEBUG] Output color flag is 1
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-02-23 04:55:16
[DEBUG] cmdline: hydra -L ./SSH-username-top30.txt -P ./passwd-CN-Top10000.txt -d smb2://192.168.1.102
[DEBUG] opt:6 argc:7 mod:smb2 tgt:192.168.1.102 port:0 misc:(null)
[WARNING] Workgroup was not specified, using "WORKGROUP"
[DATA] max 16 tasks per 1 server, overall 16 tasks, 300000 login tries (l:30/p:10000), ~18750 tries per task
[DATA] attacking smb2://192.168.1.102:445/
[VERBOSE] Resolving addresses ...
[DEBUG] resolving 192.168.1.102
[VERBOSE] resolving done
[DEBUG] Code: attack Time: 1740257716
[DEBUG] Options: mode 3 ssl 0 restore 0 showAttempt 0 tasks 16 max_use 16 tnp 0 tpsal 0 tprl 0 exit_found 0 miscptr (null) service smb2
[DEBUG] Brains: active 0 targets 1 finished 0 todo_all 300000 todo 300000 sent 0 found 0 countlogin 30 sizelogin 194 countpass 10000 sizepass 81716
[DEBUG] Target 0 - target 192.168.1.102 ip 192.168.1.102 login_no 0 pass_no 0 sent 0 pass_state 0 redo_state 0 (0 redos) use_count 0 failed 0 done 0 fail_count 0 login_ptr root pass_ptr 123456
[DEBUG] Task 0 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 1 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 2 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 3 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 4 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 5 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 6 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 7 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 8 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 9 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 10 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 11 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 12 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 13 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 14 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Task 15 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
[DEBUG] Tasks 16 inactive 0 active
[DEBUG] child 0 got target 0 selected
[DEBUG] child 0 spawned for target 0 with pid 196211
[DEBUG] child 1 got target 0 selected
[DEBUG] head_no 0 has pid 196211
[DEBUG] child 1 spawned for target 0 with pid 196212
[DEBUG] child 2 got target 0 selected
[DEBUG] head_no 1 has pid 196212
[DEBUG] child 2 spawned for target 0 with pid 196213
[DEBUG] child 3 got target 0 selected
[DEBUG] head_no 2 has pid 196213
[DEBUG] child 3 spawned for target 0 with pid 196214
[DEBUG] child 4 got target 0 selected
[DEBUG] head_no 3 has pid 196214
[DEBUG] child 4 spawned for target 0 with pid 196215
[DEBUG] child 5 got target 0 selected
[DEBUG] head_no 4 has pid 196215
[DEBUG] child 5 spawned for target 0 with pid 196216
[DEBUG] child 6 got target 0 selected
[DEBUG] head_no 5 has pid 196216
[DEBUG] child 6 spawned for target 0 with pid 196217
[DEBUG] child 7 got target 0 selected
[DEBUG] head_no 6 has pid 196217
[DEBUG] child 7 spawned for target 0 with pid 196218
[DEBUG] child 8 got target 0 selected
[DEBUG] head_no 7 has pid 196218
[DEBUG] child 8 spawned for target 0 with pid 196219
[DEBUG] child 9 got target 0 selected
[DEBUG] head_no 8 has pid 196219
[DEBUG] child 9 spawned for target 0 with pid 196220
[DEBUG] child 10 got target 0 selected
[DEBUG] head_no 9 has pid 196220
[DEBUG] child 10 spawned for target 0 with pid 196221
[DEBUG] child 11 got target 0 selected
[DEBUG] head_no 10 has pid 196221
[DEBUG] child 11 spawned for target 0 with pid 196222
[DEBUG] child 12 got target 0 selected
[DEBUG] head_no 11 has pid 196222
[DEBUG] child 12 spawned for target 0 with pid 196223
[DEBUG] child 13 got target 0 selected
[DEBUG] head_no 12 has pid 196223
[DEBUG] child 13 spawned for target 0 with pid 196224
[DEBUG] child 14 got target 0 selected
[DEBUG] head_no 13 has pid 196224
[DEBUG] child 14 spawned for target 0 with pid 196225
[DEBUG] child 15 got target 0 selected
[DEBUG] head_no 14 has pid 196225
[DEBUG] child 15 spawned for target 0 with pid 196226
[DEBUG] head_no 15 has pid 196226
[DEBUG] head_no[0] read n
[DEBUG] send_next_pair_init target 0, head 0, redo 0, redo_state 0, pass_state 0. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 123456, logincnt 0/30, passcnt 0/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 123456, tlogin root, tpass 123456789, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "123456" - 1 of 300000 [child 0] (0/0)
[DEBUG] head_no[1] read n
[DEBUG] send_next_pair_init target 0, head 1, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 123456789, logincnt 0/30, passcnt 1/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 123456789, tlogin root, tpass 111111, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "123456789" - 2 of 300000 [child 1] (0/0)
[DEBUG] head_no[2] read n
[DEBUG] send_next_pair_init target 0, head 2, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 111111, logincnt 0/30, passcnt 2/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 111111, tlogin root, tpass 0, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "111111" - 3 of 300000 [child 2] (0/0)
[DEBUG] head_no[3] read n
[DEBUG] send_next_pair_init target 0, head 3, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 0, logincnt 0/30, passcnt 3/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 0, tlogin root, tpass 123123, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "0" - 4 of 300000 [child 3] (0/0)
[DEBUG] head_no[4] read n
[DEBUG] send_next_pair_init target 0, head 4, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 123123, logincnt 0/30, passcnt 4/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 123123, tlogin root, tpass 5201314, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "123123" - 5 of 300000 [child 4] (0/0)
[DEBUG] head_no[5] read n
[DEBUG] send_next_pair_init target 0, head 5, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 5201314, logincnt 0/30, passcnt 5/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 5201314, tlogin root, tpass 123321, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "5201314" - 6 of 300000 [child 5] (0/0)
[DEBUG] head_no[6] read n
[DEBUG] send_next_pair_init target 0, head 6, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 123321, logincnt 0/30, passcnt 6/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 123321, tlogin root, tpass 12345678, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "123321" - 7 of 300000 [child 6] (0/0)
[DEBUG] head_no[7] read n
[DEBUG] send_next_pair_init target 0, head 7, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 12345678, logincnt 0/30, passcnt 7/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 12345678, tlogin root, tpass 7758521, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "12345678" - 8 of 300000 [child 7] (0/0)
[DEBUG] head_no[8] read n
[DEBUG] send_next_pair_init target 0, head 8, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 7758521, logincnt 0/30, passcnt 8/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 7758521, tlogin root, tpass 1234567, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "7758521" - 9 of 300000 [child 8] (0/0)
[DEBUG] head_no[9] read n
[DEBUG] send_next_pair_init target 0, head 9, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 1234567, logincnt 0/30, passcnt 9/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 1234567, tlogin root, tpass a123456, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "1234567" - 10 of 300000 [child 9] (0/0)
[DEBUG] head_no[10] read n
[DEBUG] send_next_pair_init target 0, head 10, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass a123456, logincnt 0/30, passcnt 10/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass a123456, tlogin root, tpass 1234567890, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "a123456" - 11 of 300000 [child 10] (0/0)
[DEBUG] head_no[11] read n
[DEBUG] send_next_pair_init target 0, head 11, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 1234567890, logincnt 0/30, passcnt 11/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 1234567890, tlogin root, tpass 112233, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "1234567890" - 12 of 300000 [child 11] (0/0)
[DEBUG] head_no[12] read n
[DEBUG] send_next_pair_init target 0, head 12, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 112233, logincnt 0/30, passcnt 12/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 112233, tlogin root, tpass 1314520, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "112233" - 13 of 300000 [child 12] (0/0)
[DEBUG] head_no[13] read n
[DEBUG] send_next_pair_init target 0, head 13, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 1314520, logincnt 0/30, passcnt 13/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 1314520, tlogin root, tpass 5211314, redo 0
INFO: Current debug levels:
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
INFO: Current debug levels:
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%1314520
INFO: Current debug levels:
all: 7
tdb: 7
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
printdrivers: 7
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
lanman: 7
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
[ATTEMPT] target 192.168.1.102 - login "root" - pass "1314520" - 14 of 300000 [child 13] (0/0)
Connecting to 192.168.1.102 at port 445
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
[DEBUG] head_no[14] read n
tevent: 7
[DEBUG] send_next_pair_init target 0, head 14, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass 5211314, logincnt 0/30, passcnt 14/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass 5211314, tlogin root, tpass zxcvbnm, redo 0
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%123456
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
Connecting to 192.168.1.102 at port 445
[ATTEMPT] target 192.168.1.102 - login "root" - pass "5211314" - 15 of 300000 [child 14] (0/0)
[DEBUG] head_no[15] read n
[DEBUG] send_next_pair_init target 0, head 15, redo 0, redo_state 0, pass_state 3. loop_mode 0, curlogin (null), curpass (null), tlogin root, tpass zxcvbnm, logincnt 0/30, passcnt 15/10000, loop_cnt 1
[DEBUG] send_next_pair_mid done 1, pass_state 3, clogin root, cpass zxcvbnm, tlogin root, tpass 147258369, redo 0
[ATTEMPT] target 192.168.1.102 - login "root" - pass "zxcvbnm" - 16 of 300000 [child 15] (0/0)
INFO: Current debug levels:
INFO: Current debug levels:
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%123321
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
Connecting to 192.168.1.102 at port 445
INFO: Current debug levels:
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%12345678
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
Connecting to 192.168.1.102 at port 445
INFO: Current debug levels:
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
INFO: Current debug levels:
INFO: Current debug levels:
all: 7
INFO: Current debug levels:
tdb: 7
INFO: Current debug levels:
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%0
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
INFO: Current debug levels:
Connecting to 192.168.1.102 at port 445
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
all: 7
all: 7
printdrivers: 7
tdb: 7
dsdb_audit: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
all: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%111111
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
INFO: Current debug levels:
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%5211314
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%123456789
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
INFO: Current debug levels:
all: 7
tdb: 7
quota: 7
Connecting to 192.168.1.102 at port 445
lanman: 7
smb: 7
dsdb_json_audit: 7
rpc_parse: 7
tdb: 7
rpc_srv: 7
INFO: Current debug levels:
rpc_cli: 7
all: 7
passdb: 7
tdb: 7
sam: 7
tdb: 7
auth: 7
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
winbind: 7
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
printdrivers: 7
vfs: 7
acls: 7
dsdb_password_audit: 7
printdrivers: 7
lanman: 7
printdrivers: 7
smb: 7
rpc_parse: 7
lanman: 7
rpc_srv: 7
smb: 7
dsdb_password_json_audit: 7
printdrivers: 7
dsdb_transaction_audit: 7
lanman: 7
dsdb_transaction_json_audit: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
locking: 7
auth: 7
msdfs: 7
winbind: 7
dmapi: 7
-> server_n=[192.168.1.102] server=[192.168.1.102]
registry: 7
lanman: 7
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
smb: 7
idmap: 7
scavenger: 7
rpc_cli: 7
dns: 7
ldb: 7
passdb: 7
quota: 7
rpc_parse: 7
acls: 7
dsdb_group_audit: 7
locking: 7
vfs: 7
idmap: 7
-> server_n=[192.168.1.102] server=[192.168.1.102]
quota: 7
msdfs: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
Connecting to 192.168.1.102 at port 445
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Connecting to 192.168.1.102 at port 445
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%a123456
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
INFO: Current debug levels:
-> server_n=[192.168.1.102] server=[192.168.1.102]
all: 7
tdb: 7
printdrivers: 7
lanman: 7
smb: 7
rpc_parse: 7
rpc_srv: 7
rpc_cli: 7
passdb: 7
sam: 7
auth: 7
winbind: 7
vfs: 7
idmap: 7
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Connecting to 192.168.1.102 at port 445
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%zxcvbnm
tevent: 7
auth_audit: 7
sam: 7
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
rpc_srv: 7
dsdb_group_json_audit: 7
rpc_cli: 7
passdb: 7
sam: 7
Using netbios name KINGNAS.
auth: 7
Using workgroup WORKGROUP.
winbind: 7
vfs: 7
idmap: 7
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%5201314
quota: 7
acls: 7
locking: 7
msdfs: 7
dmapi: 7
registry: 7
scavenger: 7
dns: 7
ldb: 7
tevent: 7
auth_audit: 7
auth_json_audit: 7
kerberos: 7
drs_repl: 7
smb2: 7
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
smb2_credits: 7
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
dsdb_transaction_json_audit: 7
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
dsdb_group_audit: 7
-> server_n=[192.168.1.102] server=[192.168.1.102]
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%112233
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
Connecting to 192.168.1.102 at port 445
acls: 7
locking: 7
dmapi: 7
auth_json_audit: 7
Connecting to 192.168.1.102 at port 445
registry: 7
auth: 7
scavenger: 7
msdfs: 7
dns: 7
kerberos: 7
winbind: 7
drs_repl: 7
ldb: 7
dmapi: 7
tevent: 7
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
vfs: 7
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
smb2: 7
idmap: 7
-> server_n=[192.168.1.102] server=[192.168.1.102]
registry: 7
quota: 7
acls: 7
auth_audit: 7
scavenger: 7
dns: 7
ldb: 7
locking: 7
auth_json_audit: 7
smb2_credits: 7
dsdb_audit: 7
msdfs: 7
kerberos: 7
tevent: 7
auth_audit: 7
dmapi: 7
registry: 7
auth_json_audit: 7
scavenger: 7
kerberos: 7
dns: 7
drs_repl: 7
ldb: 7
smb2: 7
tevent: 7
smb2_credits: 7
auth_audit: 7
dsdb_audit: 7
auth_json_audit: 7
dsdb_json_audit: 7
kerberos: 7
dsdb_password_audit: 7
drs_repl: 7
dsdb_password_json_audit: 7
smb2: 7
dsdb_transaction_audit: 7
smb2_credits: 7
dsdb_transaction_json_audit: 7
dsdb_audit: 7
Connecting to 192.168.1.102 at port 445
dsdb_group_audit: 7
dsdb_json_audit: 7
dsdb_group_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
Using netbios name KINGNAS.
dsdb_transaction_json_audit: 7
Using workgroup WORKGROUP.
dsdb_group_audit: 7
dsdb_group_json_audit: 7
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%123123
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%1234567890
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
-> server_n=[192.168.1.102] server=[192.168.1.102]
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
Connecting to 192.168.1.102 at port 445
dsdb_json_audit: 7
dsdb_password_audit: 7
drs_repl: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
Connecting to 192.168.1.102 at port 445
dsdb_transaction_json_audit: 7
dsdb_group_audit: 7
dsdb_group_json_audit: 7
smb2: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
smb2_credits: 7
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%7758521
dsdb_audit: 7
dsdb_json_audit: 7
dsdb_password_audit: 7
dsdb_password_json_audit: 7
dsdb_transaction_audit: 7
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
dsdb_transaction_json_audit: 7
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
dsdb_group_audit: 7
dsdb_group_json_audit: 7
Using netbios name KINGNAS.
Using workgroup WORKGROUP.
[INFO] Connecting to: smb://192.168.1.102/IPC$ with WORKGROUP\root%1234567
Connecting to 192.168.1.102 at port 445
parsed path: fname='smb://192.168.1.102/IPC$' server='192.168.1.102' share='IPC$' path='' options=''
SMBC_check_options(): server='192.168.1.102' share='IPC$' path='' options=''
SMBC_server: server_n=[192.168.1.102] server=[192.168.1.102]
-> server_n=[192.168.1.102] server=[192.168.1.102]
Connecting to 192.168.1.102 at port 445
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
GENSEC backend 'krb5' registered
NTLMSSP_NEGOTIATE_NTLM
GENSEC backend 'fake_gssapi_krb5' registered
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Starting GENSEC mechanism spnego
NTLMSSP: Set final flags:
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Starting GENSEC submechanism ntlmssp
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
Starting GENSEC submechanism ntlmssp
session setup ok
session setup ok
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
GENSEC backend 'spnego' registered
NTLMSSP_NEGOTIATE_NTLM
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'fake_gssapi_krb5' registered
NTLMSSP_NEGOTIATE_KEY_EXCH
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
Starting GENSEC mechanism spnego
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
tconx ok
IPC$ so ignore case sensitivity
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
tconx ok
IPC$ so ignore case sensitivity
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d440
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
Starting GENSEC mechanism spnego
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Starting GENSEC submechanism ntlmssp
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
Starting GENSEC submechanism ntlmssp
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d530
session setup ok
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
session setup ok
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
NTLMSSP_NEGOTIATE_NTLM
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
tconx ok
IPC$ so ignore case sensitivity
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d440
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
tconx ok
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
IPC$ so ignore case sensitivity
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d440
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
session setup ok
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
session setup ok
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d440
session setup ok
session setup ok
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Starting GENSEC mechanism spnego
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
Starting GENSEC submechanism ntlmssp
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d440
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d530
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d440
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
session setup ok
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
session setup ok
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d440
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d430
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
session setup ok
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d530
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
session setup ok
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
Got challenge flags:
tconx ok
Got NTLMSSP neg_flags=0x628a8215
IPC$ so ignore case sensitivity
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d440
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
session setup ok
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
Starting GENSEC mechanism spnego
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
Starting GENSEC submechanism ntlmssp
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d530
session setup ok
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d400
session setup ok
cli_session_setup_spnego_send: Connect to 192.168.1.102 as root@WORKGROUP using SPNEGO
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d530
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
session setup ok
tconx ok
IPC$ so ignore case sensitivity
Server connect ok: //192.168.1.102/IPC$: 0x55da4997d530
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d530 removed.
Context 0x55da4998c830 successfully freed
Freeing parametrics:
[DEBUG] pid 196219 called child_exit with code 1
[DEBUG] head_no[8] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "7758521" - child 8 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 1 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 7758521 - child 8
[DEBUG] head_no 8, kill 1, fail 2
[VERBOSE] Disabled child 8 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d440 removed.
Context 0x55da4997e960 successfully freed
Freeing parametrics:
[DEBUG] pid 196213 called child_exit with code 1
[DEBUG] head_no[2] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "111111" - child 2 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 2 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 111111 - child 2
[DEBUG] head_no 2, kill 1, fail 2
[VERBOSE] Disabled child 2 because of too many errors
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d430 removed.
Context 0x55da4997e950 successfully freed
Freeing parametrics:
[DEBUG] pid 196221 called child_exit with code 1
[DEBUG] head_no[10] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "a123456" - child 10 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 3 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass a123456 - child 10
[DEBUG] head_no 10, kill 1, fail 2
[VERBOSE] Disabled child 10 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d530 removed.
Context 0x55da4997ea50 successfully freed
Freeing parametrics:
[DEBUG] pid 196224 called child_exit with code 1
[DEBUG] head_no[13] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "1314520" - child 13 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 4 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 1314520 - child 13
[DEBUG] head_no 13, kill 1, fail 2
[VERBOSE] Disabled child 13 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d440 removed.
Context 0x55da4997e960 successfully freed
Freeing parametrics:
[DEBUG] pid 196211 called child_exit with code 1
[DEBUG] head_no[0] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "123456" - child 0 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 5 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 123456 - child 0
[DEBUG] head_no 0, kill 1, fail 2
[VERBOSE] Disabled child 0 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d440 removed.
Context 0x55da4997e960 successfully freed
Freeing parametrics:
[DEBUG] pid 196214 called child_exit with code 1
[DEBUG] head_no[3] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "0" - child 3 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 6 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 0 - child 3
[DEBUG] head_no 3, kill 1, fail 2
[VERBOSE] Disabled child 3 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d440 removed.
Context 0x55da4997e960 successfully freed
Freeing parametrics:
[DEBUG] pid 196217 called child_exit with code 1
[DEBUG] head_no[6] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "123321" - child 6 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 7 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 123321 - child 6
[DEBUG] head_no 6, kill 1, fail 2
[VERBOSE] Disabled child 6 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d530 removed.
Context 0x55da4998c830 successfully freed
Freeing parametrics:
[DEBUG] pid 196225 called child_exit with code 1
[DEBUG] head_no[14] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "5211314" - child 14 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 8 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 5211314 - child 14
[DEBUG] head_no 14, kill 1, fail 2
[VERBOSE] Disabled child 14 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d440 removed.
Context 0x55da4997e960 successfully freed
Freeing parametrics:
[DEBUG] pid 196218 called child_exit with code 1
[DEBUG] head_no[7] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "12345678" - child 7 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 9 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 12345678 - child 7
[DEBUG] head_no 7, kill 1, fail 2
[VERBOSE] Disabled child 7 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
smbc_remove_usused_server: 0x55da4997d440 removed.
Context 0x55da4997e960 successfully freed
Freeing parametrics:
[DEBUG] pid 196212 called child_exit with code 1
[DEBUG] head_no[1] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "123456789" - child 1 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 10 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 123456789 - child 1
[DEBUG] head_no 1, kill 1, fail 2
[VERBOSE] Disabled child 1 because of too many errors
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d400 removed.
Context 0x55da4997e920 successfully freed
Freeing parametrics:
[DEBUG] pid 196222 called child_exit with code 1
[DEBUG] head_no[11] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "1234567890" - child 11 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 11 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 1234567890 - child 11
[DEBUG] head_no 11, kill 1, fail 2
[VERBOSE] Disabled child 11 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d530 removed.
Context 0x55da49965cd0 successfully freed
Freeing parametrics:
[DEBUG] pid 196223 called child_exit with code 1
[DEBUG] head_no[12] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "112233" - child 12 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 12 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 112233 - child 12
[DEBUG] head_no 12, kill 1, fail 2
[VERBOSE] Disabled child 12 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d440 removed.
cli_status_to_errno: 0xc0000236 -> 111
Context 0x55da4997e960 successfully freed
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
Freeing parametrics:
[DEBUG] pid 196216 called child_exit with code 1
[DEBUG] head_no[5] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "5201314" - child 5 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 13 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 5201314 - child 5
[DEBUG] head_no 5, kill 1, fail 2
[VERBOSE] Disabled child 5 because of too many errors
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d530 removed.
Context 0x55da4997ea50 successfully freed
Freeing parametrics:
[DEBUG] pid 196220 called child_exit with code 1
[DEBUG] head_no[9] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "1234567" - child 9 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 14 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 1234567 - child 9
[DEBUG] head_no 9, kill 1, fail 2
[VERBOSE] Disabled child 9 because of too many errors
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
cli_status_to_errno: 0xc0000236 -> 111
smbc errno NT_STATUS_CONNECTION_REFUSED -> 111
smbc_remove_usused_server: 0x55da4997d530 removed.
Context 0x55da4998c830 successfully freed
Freeing parametrics:
[DEBUG] pid 196226 called child_exit with code 1
[DEBUG] head_no[15] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "zxcvbnm" - child 15 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 15 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass zxcvbnm - child 15
[DEBUG] head_no 15, kill 1, fail 2
[VERBOSE] Disabled child 15 because of too many errors
[ERROR] Error Connection refused (111) while connecting to 192.168.1.102
Performing aggressive shutdown.
smbc_remove_usused_server: 0x55da4997d440 removed.
Context 0x55da4997e960 successfully freed
Freeing parametrics:
[DEBUG] pid 196215 called child_exit with code 1
[DEBUG] head_no[4] read C
[ATTEMPT-ERROR] target 192.168.1.102 - login "root" - pass "123123" - child 4 - 16 of 300000
[DEBUG] hydra_increase_fail_count: 16 >= 0 => disable
[DEBUG] - will be retried at the end: ip 192.168.1.102 - login root - pass 123123 - child 4
[DEBUG] head_no 4, kill 1, fail 2
[ERROR] all children were disabled due too many connection errors
[DEBUG] while loop left with -1
0 of 1 target completed, 0 valid password found
[DEBUG] killing all remaining children now that might be stuck
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2025-02-23 04:55:18

@iamprim0rdial
Copy link

@Kaakjeking @Donvai123 Well, I had the same issue, so I used the { -t 4 -w 5 -S } flag ( -t: reduce the number of tasks from 16 to 4, -w: wait time with a 5-second delay, -S: use SSL encryption for the connection). It will resolve your problem, though it will decrease performance a bit. But your work will be done. Thanks! :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants