Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update with original #1

Merged
merged 1,358 commits into from
May 19, 2020
Merged

update with original #1

merged 1,358 commits into from
May 19, 2020

Conversation

mgeeky
Copy link
Owner

@mgeeky mgeeky commented May 19, 2020

No description provided.

SR4ven and others added 30 commits May 10, 2019 17:08
Fixed broken ldap3 requirement
Nice catch @cnotin! Merging: smbserver.py: fix order of "computer\username" in log messages
- Thought I already did it but there are some use cases that weren't working, so a more safer approach is taken now (i.e. converting everything to binary at the very beginning)
- This should address #628
Adjust the option domain-search-list to be synchronized with its definition in the RFC 3397
- We should actually do what we meant.
- Should address #631
- Changed enable_signing for set_session_key as previously used
- MIC calculations are stored using the original type3 message, in order to avoid changes when marshaling back again using impacket.
Also handling raw buffers in dtypes.STR.__getitem__()
Adjust 5257b9d changes to dtypes.STR to work in Python 2 & 3
- Plus fixing bug that wasn't showing the domain we're connecting when using the NETLOGON approach to get signing keys
and for testing KDC handling S4U2Self with unkeyed checksum.

See CVE-2018-16860 and CVE-2019-0734

Signed-off-by: Isaac Boukris <[email protected]>
- chmod +x
- Adding exec #!
- Adding impacket banner
- Fixing code style proposed by pyCharm
mohemiv and others added 29 commits April 2, 2020 06:00
rpctransport.getRemoteName() could be anything that user specified
Windows usernames are case insensitive. In smbserver credentials are
stored in the server in the exact manner they are provided by the user and fetched
using the username provided in the AUTH message as the key of the
dictionnary. If there is a difference in the case, credentials are not
found and the authentication fails.
Some exploitations or techniques that activate the NTLMrelay, like
printerbug.py, have special behaviors that affect the correct functioning
of LDAP attacks. This commit fix an issue related to those incoming
connections.
Windows 10, version 1709, Windows 10, version 1903, Windows Server,
version 1709, Windows Server, version 1903, and later versions of
Windows, have Guest access in SMB2 disabled by default. This commit adds
a trick to avoid this restriction.
…results_control

fix the ldap search with paged results
Missing byte literal string annotation added.
Replaced deprecated getheader() with get()
Added python2 support
Fixed missing byte literal and deprecated getheader
@mgeeky mgeeky merged commit 19af2b9 into mgeeky:master May 19, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.