-
Notifications
You must be signed in to change notification settings - Fork 246
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(#358) Catch NTLM hash if non-SSP authentication #367
Conversation
Getting closer to finishing this PR. @obilodeau: let me know what you think and if you have some changes for me to add to this. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Things are taking shape. Here's my review. A lot of little things, nothing major. Great work!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Another round of review/comments.
Another important problem showed up. There seems to be a problem if we don't already have a copy of the server's certificate:
|
I might have a fix for this in the works. |
Thanks for the reviews @obilodeau! Will work on them ASAP. |
Fix for major issue #367 (comment) fixed with commit 527a03b |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Very minor suggestions/comments
Co-authored-by: Olivier Bilodeau <olivier@bottomlesspit.org>
Co-authored-by: Olivier Bilodeau <olivier@bottomlesspit.org>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This PR sparks joy! 🌟
If we don't use the NLA redirection feature and the server doesn't support downgrade attacks then the best we can do is steal the hash. Some ASN.1 BER improvements were required as well. Fixes GoSecure#358 Co-authored-by: Olivier Bilodeau <obilodeau@gosecure.net>
If we don't use the NLA redirection feature and the server doesn't support downgrade attacks then the best we can do is steal the hash. Some ASN.1 BER improvements were required as well. Fixes #358 Co-authored-by: Olivier Bilodeau <obilodeau@gosecure.net>
This PR will enable PyRDP to catch the NTLM Hash during a client's connection even when it was not executed with CredSSP authentication enabled and the server enforces it. To achieve this it will cut connection with the server and create a challenge PDU for the client to respond with an authentication message.
cc @obilodeau