DanMcInerney / icebreaker

Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment
MIT License
1.18k stars 158 forks source link

RID Fails #11

Closed bucky67gto closed 6 years ago

bucky67gto commented 6 years ago

If I exclude the rid we are good, but if i do the default, I get:

] Attack 1: RID cycling in null SMB sessions into reverse bruteforce [] Checking for null SMB sessions [*] Example command that will run: rpcclient -U "" 10.207.4.3 -N -c "lsaquery" Traceback (most recent call last): File "./icebreaker.py", line 1536, in main(report, args) File "./icebreaker.py", line 1472, in main prev_creds, prev_users, domains = smb_reverse_brute(loop, hosts, args, passwords, prev_creds, prev_users, DCs) File "./icebreaker.py", line 589, in smb_reverse_brute null_sess_hosts = get_null_sess_hosts(rpc_output) File "./icebreaker.py", line 399, in get_null_sess_hosts if 'Domain Name:' in out: TypeError: argument of type 'NoneType' is not iterable

Thoughts????

skorov commented 6 years ago

I get the same problem.

This should fix it: (line 399) if out and 'Domain Name:' in out:

DanMcInerney commented 6 years ago

Can you show me the output of logs/rpcclient.log?

DanMcInerney commented 6 years ago

I fixed this like @skorov did. I think I know what was happening.