-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The Connection Has Been Terminated Because An Unexpected Server Authentication Certificate Was Received From The Remote Computer #20
Comments
Can you please run it with |
Please have a look, thanks! [] Spoofing arp replies... |
Hmmm everything looks fine. I increased verbosity with the latest commit. You could pull it and try again to see what it says. Also you may want to redact that last hex string. It contains the host name of your server. |
Thanks Adrian. Any possibility that the client validate the certificate (although the original is untrusted as well), and find out that the cloned certificate is not valid? |
No, because the SSL connection is successfully established and data is exchanged after the SSL handshake. For whatever reason the server closes the connection right before authentication. Unfortunately I'm clueless at this point. You could try running it with Anyway, thanks for reporting. |
Actually, you may have been right. See http://fixmyitsystem.com/2011/08/rdp-rds-unexpected-server.html I'll have to come up with something |
If I force the SETH_DOWNGRADE=1 or the using of the fake server with "seth.py -f, then a new failure occurs: Listening for new connection |
I have tired running the tool recently in an AD environment. ARP spoofing was successful and routed the traffic to my Kali Linux VM. However, after the victim tried to enter the credential, the RDP then returned error message " The Connection Has Been Terminated Because An Unexpected Server Authentication Certificate Was Received From The Remote Computer" and dropped the connection. Any idea to fix this issue?
Here is the output of seth.sh:
[] Spoofing arp replies...
[] Turning on IP forwarding...
[] Set iptables rules for SYN packets...
[] Waiting for a SYN packet to the original destination...
[+] Got it! Original destination is 10.0.0.87
[] Clone the x509 certificate of the original destination...
[] Adjust the iptables rule for all packets...
[*] Run RDP proxy...
Listening for new connection
Connection received from 10.0.0.164:57782
Downgrading authentication options from 11 to 3
Listening for new connection
Enable SSL
Connection lost
The text was updated successfully, but these errors were encountered: