Commit Graph

498 Commits (db9166fdf1310878f1084a0463753996ac74c833)

Author SHA1 Message Date
root 12443285e9 Fix SMB encode 2019-07-13 17:52:00 +02:00
root e435a4f87b Fix SMB encode 2019-07-13 17:50:24 +02:00
Augustin Laville fdb41c0125 Fix encoding in smb --sam 2019-04-12 13:32:38 +02:00
Harrison Neal 85e4de988b
Fix false positive signing disabled with SMB2/3
Currently, the SMBConnection.isSigningRequired and SMB3.is_signing_required methods in Impacket reflect the state of the session as opposed to the state of the connection.  When using CME with the --gen-relay-list option, the login method would encounter an exception near the end, and would reset the session state.  Afterwards, the connection state correctly showed that signing was required, but the session state claimed the opposite.  The latter contributed to many false positives in the --gen-relay-list output file.  This is a hackish change that addressed the issue for me.
2019-03-26 15:45:02 -04:00
Sebastián Castro 49a002fcd4
Merge branch 'master' into rid_hijacking 2019-03-23 16:10:44 -05:00
byt3bl33d3r 333f1c4e06 Updated all submodules, replace pycrypto with pycryptodomex 2019-03-13 21:51:25 -06:00
byt3bl33d3r a258bcf409
Merge pull request #296 from awsmhacks/patch-1
Update for requirements.txt
2019-03-09 08:38:40 -07:00
Ryan e6cd58e9bb
Update requirements.txt
Adding pycryptodomex to resolve "ImportError: No module named Cryptodome.Hash" after install
2019-03-07 14:31:09 -06:00
r4wd3r ab1e75da0e
Modify MANIFEST for RID-Hijacking 2019-02-24 20:54:14 -05:00
r4wd3r 144206cf34
Add rid_hijack documentation to README 2019-02-24 20:52:44 -05:00
r4wd3r 56ed25b621
Add rid_hijack.py module 2019-02-24 20:51:16 -05:00
r4wd3r d472bdb004
Add RID-Hijacking submodule 2019-02-24 20:50:03 -05:00
byt3bl33d3r 4c637a5c1d
Merge pull request #291 from caesarcipher-r7/patch-1
adding shabang
2019-02-20 16:52:16 -07:00
Gabriel 2276c06755
adding shabang
shabang declaration allows simpler ./setup.py execution on command line which matches existing executable permissions on setup file, rather than requiring 'python setup.py' execution
2019-02-05 13:31:02 -06:00
byt3bl33d3r dbe142c1ae
Merge pull request #280 from awsmhacks/master
update to powershell.py
2018-12-10 16:03:12 -07:00
Ryan 304836d702
update powershell.py
Adding [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]'Ssl3,Tls,Tls11,Tls12' to fix a SSL/TLS error
2018-12-06 14:07:40 -06:00
byt3bl33d3r 75449f62bc
Merge pull request #274 from RootUp/patch-1
Add Get-ComputerDetails
2018-11-18 13:37:06 -05:00
Dhiraj Mishra b4fb22f6fe
Get-ComputerDetails.py 2018-11-04 14:22:17 +05:30
byt3bl33d3r ea3402dd0e Updated requirements.txt 2018-08-29 15:35:03 +08:00
byt3bl33d3r 224c24a0a4 Updated all submodules and packages 2018-08-29 15:33:02 +08:00
byt3bl33d3r 9215b77900
Update README.md 2018-08-29 12:13:18 +08:00
byt3bl33d3r f61cb7e3f0
Merge pull request #256 from FrankSpierings/patch-2
Modified logging in spider.py
2018-08-28 19:57:55 +08:00
byt3bl33d3r 50a379dad4
Merge pull request #255 from FrankSpierings/patch-1
Update smbspider.py - Feature to use `--spider '*'` to spider all rea…
2018-08-28 19:55:54 +08:00
byt3bl33d3r 0128b589dc
Merge pull request #248 from kmackinley/kmackinley-cme-dev1
Flag to allow continuation while password spraying
2018-08-28 19:40:14 +08:00
root 1a7174137c Added remotehost in the spidering output. It is now //<remotehost>/<share>/<folder *>/<file> 2018-07-07 14:33:14 +00:00
Frank Spierings 2823452053
Update smbspider.py - Feature to use `--spider '*'` to spider all readable shares
I've added the option to allow spidering over all readable shares.
2018-07-07 16:00:59 +02:00
byt3bl33d3r 3984364cfb
Merge pull request #250 from DanMcInerney/master
updated amsi bypass
2018-05-30 10:54:11 -06:00
Dan McInerney dabdcf49ca updated amsi bypass 2018-05-29 17:47:54 -06:00
Korey McKinley 7034ab66d0
Flag to allow continuation while password spraying
Adds --continue-on-success flag when spraying passwords using smb. Allows for continuing of password spraying even after valid password is found. (Useful when password spraying with userlist.)

Usage example:
cme smb ipaddress -u users.txt -p password --continue-on-success

In response to:
https://github.com/byt3bl33d3r/CrackMapExec/issues/245
https://github.com/byt3bl33d3r/CrackMapExec/issues/247
2018-05-26 19:44:24 -06:00
byt3bl33d3r f3465ef008 Fixed up @aj-cgtech changes 2018-03-01 12:36:17 -07:00
byt3bl33d3r 5fd4aa716c Merge branch 'usersfix' of https://github.com/aj-cgtech/CrackMapExec into aj-cgtech-usersfix 2018-03-01 11:57:33 -07:00
byt3bl33d3r 12846a7e9e
Merge pull request #237 from friendlyintruder/master
fixes debug output error if exec method fails
2018-03-01 11:51:57 -07:00
byt3bl33d3r d0913ee88c
Merge pull request #234 from aj-cgtech/dbexportfeatures
Added extra export options and command line feedback.
2018-03-01 11:46:24 -07:00
Markus Krell 8dd4e95fe7 fixes debug output error if exec method fails 2018-02-23 14:55:05 +01:00
aj-cgtech fffc24ae46 Having worked out how the protocol object is created. Created config
object once, and set as an attr on each protocol.
More elegant, and allows for further config options in the future.
2018-02-23 10:13:46 +00:00
aj-cgtech b6a7028999 Typo, not l33t. 2018-02-22 21:18:31 +00:00
aj-cgtech 7e2a267328 Merging "Pwn3d!" label changes.
Fixes issue #236

Adds the ability to change the (Pwned!) label on CME output.

By default, nothing changes, but if required, to keep suits happy, you
can change the output of CME by adding a property to ~/.cme/cme.conf, in
the [CME] section, property "pwn3d_label".

eg:
[CME]
workspace = default
last_used_db = smb
pwn3d_label = Woot!
2018-02-22 20:24:03 +00:00
aj-cgtech 6ee852387c Pwn3d label parameterised in config file. 2018-02-22 13:03:07 +00:00
aj-cgtech 8bba4b46f6 Changes to users() and groups()
users() was failing on a bad attribute, changed code to use getattr
instead. If attribute is missing, it no longer throws exception.

extraction of domain from distinguished name was not working in all
circumstances. FOO.COM would work, but FOO.CO.UK or even FOO.BAR.CO.UK
would extract CO incorrectly. function now extracts fully qualified
domain, which then gets shortened by db_add_user() function.
2018-02-20 12:57:23 +00:00
aj-cgtech e1e68abe9a Added extra export options and command line feedback. 2018-02-19 14:47:12 +00:00
byt3bl33d3r 22a519ed7c
Merge pull request #231 from fang0654/master
Added module for enumerating AD DNS via WMI.
2018-01-22 20:13:04 -07:00
Daniel Lawson a908d64fc1 Added module for enumerating AD DNS via WMI. 2018-01-22 18:45:56 -06:00
byt3bl33d3r f4f9ec52c2
Updated README 2017-12-20 17:43:54 -07:00
byt3bl33d3r 4b35455997 Refactored Database Menu code
- Fixed some MSSQL DB interaction bugs
- Made MSSQL DB schema more consistent
- cmedb output now gets formatted using terminaltables (so perty)
- Made everything a bit more PEP8 compliant
2017-11-02 17:43:08 +08:00
byt3bl33d3r c1b1722bfe Merge pull request #214 from Ganapati/master
Fix errors handling from empire
2017-10-25 03:44:29 -06:00
ganapati 6b6a1b4de5 Fix errors from empire 2017-10-25 10:28:55 +02:00
byt3bl33d3r ee9b6f53d3 Updated README.md 2017-10-25 01:02:55 -06:00
byt3bl33d3r 2b00a795da Fixed Powershell execution using MSSQL 2017-10-25 00:45:58 -06:00
byt3bl33d3r f1c6858e55 Fixed bug where creds dumped via mimikatz wouldn't be added to the database 2017-10-24 22:56:34 -06:00
byt3bl33d3r 03f8fc6503 Fixes #187 2017-10-24 21:52:41 -06:00