diff --git a/servers/MSSQL.py b/servers/MSSQL.py index ed2b440..ce53f12 100755 --- a/servers/MSSQL.py +++ b/servers/MSSQL.py @@ -168,9 +168,9 @@ class MSSQLBrowser(BaseRequestHandler): if data: if data[0] in b'\x02\x03': # CLNT_BCAST_EX / CLNT_UCAST_EX self.send_response(soc, "MSSQLSERVER") - elif data[0] == b'\x04': # CLNT_UCAST_INST + elif data[0:1] == b'\x04': # CLNT_UCAST_INST self.send_response(soc, data[1:].rstrip("\x00")) - elif data[0] == b'\x0F': # CLNT_UCAST_DAC + elif data[0:1] == b'\x0F': # CLNT_UCAST_DAC self.send_dac_response(soc) def send_response(self, soc, inst): diff --git a/servers/SMB.py b/servers/SMB.py index ff90aac..d6920aa 100644 --- a/servers/SMB.py +++ b/servers/SMB.py @@ -178,7 +178,7 @@ def IsNT4ClearTxt(data, client): WordCount = data[HeadLen] ChainedCmdOffset = data[HeadLen+1] - if ChainedCmdOffset == "\x75": + if ChainedCmdOffset == "\x75" or ChainedCmdOffset == 117: PassLen = struct.unpack(' 2: @@ -200,7 +200,7 @@ class SMB1(BaseRequestHandler): # SMB1 & SMB2 Server class, NTLMSSP if not data: break - if data[0] == "\x81": #session request 139 + if data[0:1] == b"\x81": #session request 139 Buffer = "\x82\x00\x00\x00" try: self.request.send(Buffer) @@ -335,7 +335,7 @@ class SMB1LM(BaseRequestHandler): # SMB Server class, old version self.request.settimeout(1) data = self.request.recv(1024) Challenge = RandomChallenge() - if data[0] == b"\x81": #session request 139 + if data[0:1] == b"\x81": #session request 139 Buffer = "\x82\x00\x00\x00" self.request.send(NetworkSendBufferPython2or3(Buffer)) data = self.request.recv(1024) diff --git a/tools/MultiRelay/RelayMultiCore.py b/tools/MultiRelay/RelayMultiCore.py index d82856a..3c1fa2d 100644 --- a/tools/MultiRelay/RelayMultiCore.py +++ b/tools/MultiRelay/RelayMultiCore.py @@ -636,7 +636,7 @@ def MimiKatzRPC(Command, f, host, data, s): Output = ExtractRPCCommandOutput(data)[12:] while True: dataoffset = dataoffset + buffsize - if data[64:66] == b"\x05\x00" and data[67] == b"\x02":##Last DCE/RPC Frag + if data[64:66] == b"\x05\x00" and data[67:68] == b"\x02":##Last DCE/RPC Frag LastFragLen = struct.unpack('