forked from fortra/impacket
-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Test refactor #6
Open
aviadtamir
wants to merge
270
commits into
axonius_release
Choose a base branch
from
test-refactor
base: axonius_release
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- Per RFC 1002, we're discarding that packet. - We weren't, thus introducing an "Unexpected answer from server" exception
Support connect timeout with SMBTransport
Speeding up DcSync
Adding implementation of iphlpsvc.dll MSRPC calls
Fix encoding problem with smv1 connection fortra#1002
NTLMrelayx HTTPRelayServer: Python 3.x
After KB4586793 for CVE-2020-17049 the "renew_till" timestamp may be omitted from service tickets.
See https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-overview for an overview with links to deep dives into the vulnerability and exploit.
Exploit for CVE-2020-17049: new -force-forwardable flag for getST.py
There is a small typo in impacket/examples/ntlmrelayx/servers/socksserver.py. Should read `getting` rather than `gettting`.
…snovvcrash-master
Compute NTHash and AESKey for the Bronze Bit attack automatically
docs: fix simple typo, gettting -> getting
- Should address fortra#1025
Using our OpenSource address as mantainer
Added relevant example to update empty value of Key.
ldapattack: fix error when trying to escalate with machine account
Implementing reg.py ADD/DELETE functionality
Implementation of AD CS attack in ntlmrelayx.py
Fixes fortra#1079 psexec.py decoding problems on multi bytes characters
Added parsing of LSA's Security Questions Security Answers structure version 1.0
Disable anonymous logon in ntlmrelayx
Co-authored-by: 0xdeaddood <[email protected]>
Added rbcd attack script
…os-only Added support for a custom additional ticket for S4U2Proxy
Dup fix and file mode changed to 775
This reverts commit ef65bdc.
- remove secretsdump.py - remove wmiexec.py - remove ntlmrelayx.py - remove atexec.py
Impacket 0 9 24 without mimikatz
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.