-
Notifications
You must be signed in to change notification settings - Fork 410
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix mmcexec method thanks to @ippsec AND a lot of other small things #361
Conversation
Also pushed a small fix for a bug with |
…ver option to laps
Updated lsassy to 3.1.12 as it fixes an issue where lsassy would hang on failure: |
Fixed authentication without NTLM being available: If there is no NTLM we need a hostname for authentication. Line 527 in ccbeb4e
self.remotename needs a valid hostname for kerberos auth afaik.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
During @IppSec video about JAB Hackthebox Windows, he spotted a bug related to dcom exec.
https://youtu.be/tprP-GDW_6c?si=mjIlmENq92Kx_u6E&t=1659
To execute remote commands using dcom you don't need to be admin (or have the privilege to start a service) making the check (admin_require) not relevant for this method.
This PR fix the problem :)
Before:
![image](https://private-user-images.githubusercontent.com/5891788/344494420-9108eec9-2e21-4fed-8e30-8dd5b29c44bc.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.8Vcg92KUgP-AaGqYxGAnsBnNXGfDjkwLQgTtPwpoLzA)
After:
Command exec: