mirror of
https://github.com/bettercap/bettercap
synced 2025-08-14 02:36:57 -07:00
fix: fixed a bug in NTLM parser which prevented the HTTP parser from being called.
This commit is contained in:
parent
a7719826db
commit
1ac5521038
1 changed files with 5 additions and 1 deletions
|
@ -32,6 +32,8 @@ func isResponse(s string) bool {
|
|||
|
||||
func ntlmParser(ip *layers.IPv4, pkt gopacket.Packet, tcp *layers.TCP) bool {
|
||||
data := tcp.Payload
|
||||
ok := false
|
||||
|
||||
for _, line := range strings.Split(string(data), "\r\n") {
|
||||
if isNtlm(line) {
|
||||
tokens := strings.Split(line, " ")
|
||||
|
@ -39,8 +41,10 @@ func ntlmParser(ip *layers.IPv4, pkt gopacket.Packet, tcp *layers.TCP) bool {
|
|||
continue
|
||||
}
|
||||
if isChallenge(line) {
|
||||
ok = true
|
||||
ntlm.AddServerResponse(tcp.Ack, tokens[2])
|
||||
} else if isResponse(line) {
|
||||
ok = true
|
||||
ntlm.AddClientResponse(tcp.Seq, tokens[2], func(data packets.NTLMChallengeResponseParsed) {
|
||||
NewSnifferEvent(
|
||||
pkt.Metadata().Timestamp,
|
||||
|
@ -60,5 +64,5 @@ func ntlmParser(ip *layers.IPv4, pkt gopacket.Packet, tcp *layers.TCP) bool {
|
|||
}
|
||||
}
|
||||
}
|
||||
return true
|
||||
return ok
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue