Deft_
Deft_
@mpgn looks like it's related to this https://github.com/byt3bl33d3r/CrackMapExec/issues/321 I have got the same issue without the guest thing:  Apparently you issued a patch because continue-on-success wasn't working on servers...
Yeah I agree xD So going back to what I said before. There is no issue, if guest is enabled, authentication will always be valid so nxc stops.
These look like local users. If you want to bruteforce local users, add the --local-auth. Otherwise disable the guest domain user and guest local accounts
Man that's really hot ahah! Love it!!
> this option makes no sense, it should be renamed or should be deleted on all modul imo Clearly. If you are using NXC for opsec stuff, reconsider yourself ahahah
Man that is a fantastic update! I wasn't aware of this MSSQL Browser thing!!
Yeah don't worry about the testing, I'm actually finishing integrating encryption and channel binding on Impacket, and then on NXC, myself so I have got a lab on which I...
Hey man! I think I missed something in the SQL browser configuration cause I can't seem to have a dynamic port here:  Althought I have followed you setup instructions....
I'll be looking into this one that week mate! Sorry for the long delay but I had to implement the CBT thing before ahah!
There is something I don't get: Which is produced by that code: ```python # Get number of mssql instance self.mssql_instances = self.conn.getInstances() print(self.mssql_instances) ``` You mentionned there is another way...