SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections
MIT License
1.39k stars 324 forks source link

Debian Buster: OpenSSL has TLSv1.{0,1} disabled by default, problems with Python API #13

Closed lgcambero closed 6 years ago

lgcambero commented 7 years ago

Connection received from 192.168.1.14 Enable SSL Traceback (most recent call last): File "/root/GitHub/Seth/rdp-cred-sniffer.py", line 821, in run() File "/root/GitHub/Seth/rdp-cred-sniffer.py", line 803, in run enableSSL() File "/root/GitHub/Seth/rdp-cred-sniffer.py", line 729, in enableSSL certfile=args.certfile, File "/usr/lib/python3.5/ssl.py", line 1077, in wrap_socket ciphers=ciphers) File "/usr/lib/python3.5/ssl.py", line 760, in init self.do_handshake() File "/usr/lib/python3.5/ssl.py", line 996, in do_handshake self._sslobj.do_handshake() File "/usr/lib/python3.5/ssl.py", line 641, in do_handshake self._sslobj.do_handshake() ssl.SSLError: [SSL: VERSION_TOO_LOW] version too low (_ssl.c:719) [] Cleaning up... [] Done. root@lgcambero:~/GitHub/Seth# openssl version OpenSSL 1.1.0f 25 May 2017

Any idea? Tks.

AdrianVollmer commented 7 years ago

What version is the client? (Check the properties of mstsc.exe.) Looks like the client wants to use an SSL version that the current version of openssl does not support. If you can, feel free to record the network traffic with wireshark or tcpdump and send me the pcap file.

lgcambero commented 7 years ago

Hi, obviously it is the OpenSSL version, since the error was submitted after updating the system. I already solved it using an earlier version of OpenSSL. I invite you to look: Https://www.youtube.com/watch?v=wMTYLc8ajPw Good job. Greetings.

AdrianVollmer commented 7 years ago

Awesome video, thanks!

AdrianVollmer commented 6 years ago

Just FYI, I also encountered this issue and is has to do with this.

I filed a bug report with the python devs, and they involved a Debian maintainer.

AdrianVollmer commented 6 years ago

Latest commit fixed this as well