SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections
MIT License
1.38k stars 325 forks source link

Error message "BrokenPipeError: [Errno 32] Broken pipe" #48

Closed RoseDeSable closed 3 years ago

RoseDeSable commented 4 years ago

Hi, in some cases I receive an error, but the attack functions:

Tamper with NTLM response TLS alert access denied, Downgrading CredSSP Connection received from myPCasVictim:64766 Warning: RC4 not available on client, attack might not work Listening for new connection Server enforces NLA; switching to 'fake server' mode Enable SSL Connection lost on enableSSL: [Errno 104] Connection reset by peer Hiding forged protocol request from client Exception in thread Thread-2: Traceback (most recent call last): File "/usr/lib/python3.7/threading.py", line 926, in _bootstrap_inner self.run() File "/root/Seth/seth/main.py", line 49, in run self.run_fake_server() File "/root/Seth/seth/main.py", line 100, in run_fake_server (id, id))) File "/usr/lib/python3.7/ssl.py", line 1003, in send return self._sslobj.write(data) BrokenPipeError: [Errno 32] Broken pipe

I have no effort by changing MinProtocol from TLSv1.2 to TLSv1.0

AdrianVollmer commented 3 years ago

Same as #28