SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections
MIT License
1.38k stars 325 forks source link

Support darwin os #42

Closed areYouLazy closed 4 years ago

areYouLazy commented 4 years ago

This fix data extraction from certificates, adds a more granular control over pfctl and sysctl and fix issue in previous pull request

AdrianVollmer commented 4 years ago

Changes to seth.sh look good so far. But I don't understand what the motivation is for the changes to main.py? Is it just improved error handling?

Also, I believe the import of sys is unnecessary.

I think I should be able to test your PR during the next week.

areYouLazy commented 4 years ago

Damn you're right, I used to sys.exit(1) instead of os._exit(1)

For changes in main.py, it indeed improve error handling, also while reading the docs I found that the "old" wrap_socket is deprecated in favor of the one from an instance of SSLCotext, so I tried to implement it both for compatibility and to see if it handle the connection to the backend better.

Ref: https://docs.python.org/3/library/ssl.html#socket-creation