mirror of
https://github.com/lgandx/Responder.git
synced 2025-08-19 21:03:33 -07:00
minor fix
This commit is contained in:
parent
4231532926
commit
ae1c2be51c
3 changed files with 9 additions and 9 deletions
|
@ -39,14 +39,14 @@ class DNS(BaseRequestHandler):
|
||||||
|
|
||||||
try:
|
try:
|
||||||
data, soc = self.request
|
data, soc = self.request
|
||||||
if ParseDNSType(NetworkRecvBufferPython2or3(data)) is "A" and settings.Config.AnalyzeMode == False:
|
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "A" and settings.Config.AnalyzeMode == False:
|
||||||
buff = DNS_Ans()
|
buff = DNS_Ans()
|
||||||
buff.calculate(NetworkRecvBufferPython2or3(data))
|
buff.calculate(NetworkRecvBufferPython2or3(data))
|
||||||
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
|
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
|
||||||
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
|
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
|
||||||
print(color("[*] [DNS] A Record poisoned answer sent to: %-15s Requested name: %s" % (self.client_address[0], ResolveName), 2, 1))
|
print(color("[*] [DNS] A Record poisoned answer sent to: %-15s Requested name: %s" % (self.client_address[0], ResolveName), 2, 1))
|
||||||
|
|
||||||
if ParseDNSType(NetworkRecvBufferPython2or3(data)) is "SRV" and settings.Config.AnalyzeMode == False:
|
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "SRV" and settings.Config.AnalyzeMode == False:
|
||||||
buff = DNS_SRV_Ans()
|
buff = DNS_SRV_Ans()
|
||||||
buff.calculate(NetworkRecvBufferPython2or3(data))
|
buff.calculate(NetworkRecvBufferPython2or3(data))
|
||||||
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
|
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
|
||||||
|
@ -65,14 +65,14 @@ class DNSTCP(BaseRequestHandler):
|
||||||
|
|
||||||
try:
|
try:
|
||||||
data = self.request.recv(1024)
|
data = self.request.recv(1024)
|
||||||
if ParseDNSType(NetworkRecvBufferPython2or3(data)) is "A" and settings.Config.AnalyzeMode is False:
|
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "A" and settings.Config.AnalyzeMode is False:
|
||||||
buff = DNS_Ans()
|
buff = DNS_Ans()
|
||||||
buff.calculate(NetworkRecvBufferPython2or3(data))
|
buff.calculate(NetworkRecvBufferPython2or3(data))
|
||||||
self.request.send(NetworkSendBufferPython2or3(buff))
|
self.request.send(NetworkSendBufferPython2or3(buff))
|
||||||
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
|
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
|
||||||
print(color("[*] [DNS] A Record poisoned answer sent to: %-15s Requested name: %s" % (self.client_address[0], ResolveName), 2, 1))
|
print(color("[*] [DNS] A Record poisoned answer sent to: %-15s Requested name: %s" % (self.client_address[0], ResolveName), 2, 1))
|
||||||
|
|
||||||
if ParseDNSType(NetworkRecvBufferPython2or3(data)) is "SRV" and settings.Config.AnalyzeMode == False:
|
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "SRV" and settings.Config.AnalyzeMode == False:
|
||||||
buff = DNS_SRV_Ans()
|
buff = DNS_SRV_Ans()
|
||||||
buff.calculate(NetworkRecvBufferPython2or3(data))
|
buff.calculate(NetworkRecvBufferPython2or3(data))
|
||||||
self.request.send(NetworkSendBufferPython2or3(buff))
|
self.request.send(NetworkSendBufferPython2or3(buff))
|
||||||
|
|
|
@ -40,11 +40,11 @@ def CalculateDNSName(name):
|
||||||
def ParseCLDAPNetlogon(data):
|
def ParseCLDAPNetlogon(data):
|
||||||
try:
|
try:
|
||||||
Dns = data.find(b'DnsDomain')
|
Dns = data.find(b'DnsDomain')
|
||||||
if Dns is -1:
|
if Dns == -1:
|
||||||
return False
|
return False
|
||||||
DnsName = data[Dns+9:]
|
DnsName = data[Dns+9:]
|
||||||
DnsGuidOff = data.find(b'DomainGuid')
|
DnsGuidOff = data.find(b'DomainGuid')
|
||||||
if DnsGuidOff is -1:
|
if DnsGuidOff == -1:
|
||||||
return False
|
return False
|
||||||
Guid = data[DnsGuidOff+10:]
|
Guid = data[DnsGuidOff+10:]
|
||||||
if Dns:
|
if Dns:
|
||||||
|
@ -72,13 +72,13 @@ def ParseSearch(data):
|
||||||
t.calculate()
|
t.calculate()
|
||||||
return str(t)
|
return str(t)
|
||||||
|
|
||||||
elif re.search(b'(?i)(objectClass0*.*supportedSASLMechanisms)', data):
|
if re.search(b'(?i)(objectClass0*.*supportedSASLMechanisms)', data):
|
||||||
return str(LDAPSearchSupportedMechanismsPacket(MessageIDASNStr=TID,MessageIDASN2Str=TID))
|
return str(LDAPSearchSupportedMechanismsPacket(MessageIDASNStr=TID,MessageIDASN2Str=TID))
|
||||||
|
|
||||||
elif re.search(b'(?i)(objectClass0*.*supportedCapabilities)', data):
|
elif re.search(b'(?i)(objectClass0*.*supportedCapabilities)', data):
|
||||||
return str(LDAPSearchSupportedCapabilitiesPacket(MessageIDASNStr=TID,MessageIDASN2Str=TID))
|
return str(LDAPSearchSupportedCapabilitiesPacket(MessageIDASNStr=TID,MessageIDASN2Str=TID))
|
||||||
|
|
||||||
if re.search(b'(objectClass)', data):
|
elif re.search(b'(objectClass)', data):
|
||||||
return str(LDAPSearchDefaultPacket(MessageIDASNStr=TID))
|
return str(LDAPSearchDefaultPacket(MessageIDASNStr=TID))
|
||||||
|
|
||||||
def ParseLDAPHash(data,client, Challenge): #Parse LDAP NTLMSSP v1/v2
|
def ParseLDAPHash(data,client, Challenge): #Parse LDAP NTLMSSP v1/v2
|
||||||
|
|
|
@ -47,7 +47,7 @@ def Chose3264x(packet):
|
||||||
|
|
||||||
def FindNTLMOpcode(data):
|
def FindNTLMOpcode(data):
|
||||||
SSPIStart = data.find(b'NTLMSSP')
|
SSPIStart = data.find(b'NTLMSSP')
|
||||||
if SSPIStart is -1:
|
if SSPIStart == -1:
|
||||||
return False
|
return False
|
||||||
SSPIString = data[SSPIStart:]
|
SSPIString = data[SSPIStart:]
|
||||||
return SSPIString[8:12]
|
return SSPIString[8:12]
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue