{"uuid": "547ba9ed-3c3b-4872-aef8-8e8ec033154e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21300", "type": "published-proof-of-concept", "source": "https://t.me/cKure/6922", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0  Capture Credentials with our new SMB Server.\n\nMetasploit now captures NTLM hashes from any recent Windows release using SMBv2 and SMBv3, even with encrypted SMB traffic. Plus, twitter.com/chompie1337's eBPF exploit lands, along with modules for Git LFS and Geutebruck IP cameras.\n\nCVE-2021-21300\n\nhttps://www.rapid7.com/blog/post/2021/09/03/metasploit-wrap-up-128/", "creation_timestamp": "2021-09-03T19:25:13.000000Z"}