SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections
MIT License
1.39k stars 324 forks source link

Unknow Hash Algorithm OID #4

Closed n1841175 closed 7 years ago

n1841175 commented 7 years ago

After "cloning the certification";

[*] Spoofing arp replies...
[*] Turning on IP forwarding...
[*] Set iptables rules for SYN packets...
[*] Waiting for a SYN packet to the original destination...
[+] Got it! Original destination is 192.168.2.106
[*] Clone the x509 certificate of the original destination...
Unknow Hash Algorithm OID: 
[*] Cleaning up...
[*] Done.
AdrianVollmer commented 7 years ago

Apparently older versions of openssl asn1parse don't support output to stdout with -out -. 8cb1cf1e fixes it.