Metasploit SMB Challenge Theft
This module launches a Metasploit listener that attempts to covertly steal SMB Challenge hashes. Once the Metasploit module has been launched, the targeted zombies will be redirected to Metasploit to attempt to capture credentials.

Setup MSF to allow BeEF access (settings in /beef/ui/msf.php):
    sudo ./msfconsole
    msf > load xmlrpc Pass=BeEFMSFPass
SRVHOST (Required)
SRVPORT (Required)
URIPATH


After a successful exploitation the results can be found:
Captured hashes
Captured hashes (Cain & Able format)