-
-
Notifications
You must be signed in to change notification settings - Fork 581
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG]Powershell version 2 TLS Handshake failure #155
Comments
Maybe we can do like this:
|
@tyraniter that's a good idea. I will work on fixing this for the next bug fix release or you can submit a PR. |
I will submit a PR |
Fix added to v3.1.5 |
Empire Version
OS Information (Linux flavor, Python version)
Describe the bug
When using powershell client on Windows 7 on which the default version of powershell and dotnet is 2 to connect to a https listener , there will be an "HandShake Failure"
To Reproduce
Steps to reproduce the behavior:
Expected behavior
In default status, windows 7 only supports TLS1.0 and in lib/listeners/http.py,most of the following cipher suite is only supported after TLS1.2.If the random function return a cipher suite which TLS1.0 does not support,"HandShake Failure".
This list is added in #27 for "randomized JA3S signature". The python ssl.set_ciphers function can only be passed a string but not a list as parameter.Maybe we can use TLS1.0 cipher suites only for compatibility?
Screenshots
N/A
Additional context
N/A
The text was updated successfully, but these errors were encountered: