diff --git a/lib/net/winrm/connection.rb b/lib/net/winrm/connection.rb index c253aef512..6fdaeebf86 100644 --- a/lib/net/winrm/connection.rb +++ b/lib/net/winrm/connection.rb @@ -168,6 +168,9 @@ module Net self.http_client = Rex::Proto::Http::Client.new(opts[:host], opts[:port], {}, opts[:ssl], opts[:ssl_version], opts[:proxies], opts[:user], opts[:password]) @mutex = Mutex.new self.uri = opts[:uri] + if opts[:realm] + self.http_client.set_config('domain' => opts[:realm]) + end end def send_request(message) diff --git a/modules/auxiliary/scanner/winrm/winrm_login.rb b/modules/auxiliary/scanner/winrm/winrm_login.rb index 29dff9e861..34c0baec88 100644 --- a/modules/auxiliary/scanner/winrm/winrm_login.rb +++ b/modules/auxiliary/scanner/winrm/winrm_login.rb @@ -94,7 +94,8 @@ class MetasploitModule < Msf::Auxiliary :no_ssl_peer_verification => true, :operation_timeout => 1, :http_timeout => 20, # For the underlying HTTP client - :retry_delay => 1 + :retry_delay => 1, + :realm => result.credential.realm, ) shell = conn.shell(:stdin) # Trigger the shell to open