-
Notifications
You must be signed in to change notification settings - Fork 3.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fixed RPC_C_AUTHN_NETLOGON auth error #1868
base: master
Are you sure you want to change the base?
Conversation
Hi, 🌻 |
I just saw your PR, nice job! |
hello @Ridter . I'm testing your changes with your netsync project. I wasn't able to execute it successfully in the context of this PR. I made a little modification in order to be able to perform AES authentication.
This issue was addressed in the context of #1848. In the context of that PR the test executed successfully
@Ridter I'm trying to figure out which scenario triggers the issue that it's being fixed with this PR. Can you help me with that? |
Hi, @anadrianmanrique . The previous code only implemented netsync through strong key. Now, based on PR #1848, I have added support for AES. The current code is fully functional and ready to use. Using StrongKey authentication ![]() |
Hello, I think you should reopen a PR with only 🌻 |
@ThePirateWhoSmellsOfSunflowers Hi. To run netsync.py, you need to modify getSSPType1 in rpcrt.py, otherwise, it will fail to execute. If you need me to submit a separate PR, I can roll back the current commit and submit a separate PR. |
Hello @Ridter, thanks for clarification about strong key. Regarding the latest changes I think netsync.py should be removed from this PR, as it is not part of the scope of the original. |
@Ridter The script works without modifying
|
@Ridter also, your branch should be rebased : git rebase master |
1c07279
to
b200cf3
Compare
1b49c25
to
d14ca4c
Compare
* Fix SMB2 compoud response signing Fix the signing the logic when responding with an SMB2 compount response. The signature will include the padding of each compound element and include the next offset value before signing the data. * Pad all SMB2 packets, even the last in a compound response
Co-authored-by: Lucas Vater <lucas.vater@redteam-pentesting.de>
…ortra#1859) * Fix file length not matching file name because of multi-byte UTF-16 * Apply suggestions from code review Co-authored-by: alexisbalbachan <alexisbalbachan@gmail.com> --------- Co-authored-by: alexisbalbachan <alexisbalbachan@gmail.com>
* add EvtRpcRegisterControllableOperation and EvtRpcClearLog to even6 protocol * add EvtRpcExportLog request to even6 * add tests for even6 EvtRpcClearLog and EvtRpcExportLog requests * minor changes in even6
* Update socksserver.py Fixes fortra#1575 by parsing the target hostname correctly from commands run through ntlmrelayx's socks5 proxy. * Update socksserver.py Fix hostname parsing
Co-authored-by: laxa <laxa@ddracepro.net>
* fix netlogon implementation * add AES option when netlogon is used as SSP
Done,😊 |
Hi,@ThePirateWhoSmellsOfSunflowers, when I use |
In the process of implementing NetSync using Impacket, I discovered an issue in the authentication section of RPC_C_AUTHN_NETLOGON within Impacket. I made modifications to address the problem, and this submission contains the updated code.
Testing details can be found below: netsync.py.
Shown in the following image:
