Several Bugfix

This commit is contained in:
lgandx 2017-09-04 18:50:04 -03:00
parent ffca0e2a92
commit 75aa21bbb9

View file

@ -120,14 +120,11 @@ def ParseClearTextSQLPass(data, client):
# MSSQL Server class # MSSQL Server class
class MSSQL(BaseRequestHandler): class MSSQL(BaseRequestHandler):
def handle(self): def handle(self):
if settings.Config.Verbose:
print text("[MSSQL] Received connection from %s" % self.client_address[0])
try: try:
while True:
data = self.request.recv(1024) data = self.request.recv(1024)
self.request.settimeout(0.1) if settings.Config.Verbose:
Challenge = RandomChallenge() print text("[MSSQL] Received connection from %s" % self.client_address[0])
if data[0] == "\x12": # Pre-Login Message if data[0] == "\x12": # Pre-Login Message
Buffer = str(MSSQLPreLoginAnswer()) Buffer = str(MSSQLPreLoginAnswer())
@ -136,6 +133,7 @@ class MSSQL(BaseRequestHandler):
if data[0] == "\x10": # NegoSSP if data[0] == "\x10": # NegoSSP
if re.search("NTLMSSP",data): if re.search("NTLMSSP",data):
Challenge = RandomChallenge()
Packet = MSSQLNTLMChallengeAnswer(ServerChallenge=Challenge) Packet = MSSQLNTLMChallengeAnswer(ServerChallenge=Challenge)
Packet.calculate() Packet.calculate()
Buffer = str(Packet) Buffer = str(Packet)
@ -145,10 +143,9 @@ class MSSQL(BaseRequestHandler):
ParseClearTextSQLPass(data,self.client_address[0]) ParseClearTextSQLPass(data,self.client_address[0])
if data[0] == "\x11": # NegoSSP Auth if data[0] == "\x11": # NegoSSP Auth
ParseSQLHash(data,self.client_address[0]) ParseSQLHash(data,self.client_address[0],Challenge)
except: except:
self.request.close()
pass pass
# MSSQL Server Browser class # MSSQL Server Browser class