CravateRouge / bloodyAD

BloodyAD is an Active Directory Privilege Escalation Framework
MIT License
1.12k stars 112 forks source link

Kerberos Authentication - KeyError: 'dcc' #47

Closed 0xGreen closed 1 week ago

0xGreen commented 1 week ago

Using the tool for a while, for the first time facing an issues with Kerberos authentication for HTB machine "Absolute".

Any suggestions? other tools for example netexec works fine with Kerberos auth for the same account. Also,using the latest code from git.

bloodyAD -d absolute.htb --host DC.absolute.htb --dc-ip 10.129.229.59 -k -u d.klay -p "Darkmoonsky248girl" get writable
Traceback (most recent call last):
  File "/root/Tools/bloodyAD/bloodyAD.py", line 5, in <module>
    main.main()
  File "/root/Tools/bloodyAD/bloodyAD/main.py", line 157, in main
    for entry in output:
  File "/root/Tools/bloodyAD/bloodyAD/cli_modules/get.py", line 485, in writable
    searchbases.append(conn.ldap.domainNC)
                       ^^^^^^^^^
  File "/root/Tools/bloodyAD/bloodyAD/network/config.py", line 80, in ldap
    self._ldap = Ldap(self.conf)
                 ^^^^^^^^^^^^^^^
  File "/root/Tools/bloodyAD/bloodyAD/network/ldap.py", line 89, in __init__
    ldap_factory = LDAPConnectionFactory.from_url(
                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/local/lib/python3.11/dist-packages/msldap/commons/factory.py", line 80, in from_url
    credential = UniCredential.from_url(connection_url)
                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/root/Tools/bloodyAD/bloodyAD/msldap_patch.py", line 681, in from_url
    if extra["dcc"] is not None:
       ~~~~~^^^^^^^
KeyError: 'dcc'
CravateRouge commented 1 week ago

I think it's a package version issue. You should have at least the version 0.0.17 of asyauth

0xGreen commented 1 week ago

Thank you, indeed, it was. Just updated to 0.0.20 and it just works fine now!