mirror of
https://github.com/bettercap/bettercap
synced 2025-08-22 06:23:18 -07:00
Updated logs for rdp proxy
This commit is contained in:
parent
746755e334
commit
4db82c5aec
1 changed files with 5 additions and 6 deletions
|
@ -47,7 +47,7 @@ func NewRdpProxy(s *session.Session) *RdpProxy {
|
||||||
port: 3389,
|
port: 3389,
|
||||||
startPort: 40000,
|
startPort: 40000,
|
||||||
cmd: "pyrdp-mitm.py",
|
cmd: "pyrdp-mitm.py",
|
||||||
regexp: "(?i)(cookie:|mstshash=|username|password|clipboard data)",
|
regexp: "(?i)(cookie:|mstshash=|clipboard data|client info|username|password)",
|
||||||
active: make(map[string]exec.Cmd),
|
active: make(map[string]exec.Cmd),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -67,7 +67,7 @@ mod.AddParam(session.NewIntParameter("rdp.proxy.start", "40000", "Starting port
|
||||||
mod.AddParam(session.NewStringParameter("rdp.proxy.command", "pyrdp-mitm.py", "", "The PyRDP base command to launch the man-in-the-middle."))
|
mod.AddParam(session.NewStringParameter("rdp.proxy.command", "pyrdp-mitm.py", "", "The PyRDP base command to launch the man-in-the-middle."))
|
||||||
mod.AddParam(session.NewStringParameter("rdp.proxy.out", "./", "", "The output directory for PyRDP artifacts."))
|
mod.AddParam(session.NewStringParameter("rdp.proxy.out", "./", "", "The output directory for PyRDP artifacts."))
|
||||||
mod.AddParam(session.NewStringParameter("rdp.proxy.targets", session.ParamSubnet, "", "Comma separated list of IP addresses to proxy to, also supports nmap style IP ranges."))
|
mod.AddParam(session.NewStringParameter("rdp.proxy.targets", session.ParamSubnet, "", "Comma separated list of IP addresses to proxy to, also supports nmap style IP ranges."))
|
||||||
mod.AddParam(session.NewStringParameter("rdp.proxy.regexp", "(?i)(cookie:|mstshash=|username|password|clipboard data)", "", "Print PyRDP logs matching this regular expression."))
|
mod.AddParam(session.NewStringParameter("rdp.proxy.regexp", "(?i)(cookie:|mstshash=|clipboard data|client info|username|password)", "", "Print PyRDP logs matching this regular expression."))
|
||||||
return mod
|
return mod
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -227,10 +227,9 @@ func (mod *RdpProxy) handleRdpConnection(payload *nfqueue.Payload) int {
|
||||||
src, sport := p.NetworkLayer().NetworkFlow().Src(), p.TransportLayer().TransportFlow().Src()
|
src, sport := p.NetworkLayer().NetworkFlow().Src(), p.TransportLayer().TransportFlow().Src()
|
||||||
dst, dport := p.NetworkLayer().NetworkFlow().Dst(), p.TransportLayer().TransportFlow().Dst()
|
dst, dport := p.NetworkLayer().NetworkFlow().Dst(), p.TransportLayer().TransportFlow().Dst()
|
||||||
|
|
||||||
|
ips := fmt.Sprintf("[%v:%v -> %v:%v]", src, sport, dst, dport)
|
||||||
|
|
||||||
if mod.isTarget(dst.String()) {
|
if mod.isTarget(dst.String()) {
|
||||||
// TODO: Don't log here and connect a pipe to the process instead.
|
|
||||||
ips := fmt.Sprintf("[%v:%v -> %v:%v]", src, sport, dst, dport)
|
|
||||||
mod.Info("CONNECT %v", ips)
|
|
||||||
target := fmt.Sprintf("%v:%v", dst, dport)
|
target := fmt.Sprintf("%v:%v", dst, dport)
|
||||||
|
|
||||||
// 2. Check if the destination IP already has a PyRDP session active, if so, do nothing.
|
// 2. Check if the destination IP already has a PyRDP session active, if so, do nothing.
|
||||||
|
@ -260,7 +259,7 @@ func (mod *RdpProxy) handleRdpConnection(payload *nfqueue.Payload) int {
|
||||||
mod.startPort += 1
|
mod.startPort += 1
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
mod.Info("Non-target, won't intercept [%s:%v -> %v:%v]", src, sport, dst, dport)
|
mod.Info("Non-target, won't intercept %s", ips)
|
||||||
|
|
||||||
// Add an exception in the firewall to avoid intercepting packets to this destination and port
|
// Add an exception in the firewall to avoid intercepting packets to this destination and port
|
||||||
mod.doReturn(dst.String(), dport, true)
|
mod.doReturn(dst.String(), dport, true)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue