SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections
MIT License
1.38k stars 325 forks source link

sni_callback cannot be set on TLS_CLIENT context #55

Closed pipomambo closed 1 year ago

pipomambo commented 1 year ago

Hi,

I enabled TLS1.0 but I still get a TLS issue. What should I do ?

[] Linux OS detected, using iptables as the netfilter interpreter [] Spoofing arp replies... [] Turning on IP forwarding... [] Set iptables rules for SYN packets... [] Waiting for a SYN packet to the original destination... [+] Got it! Original destination is 172.16.4.51 [] Clone the x509 certificate of the original destination... [] Adjust iptables rules for all packets... [] Run RDP proxy... Listening for new connection Connection received from 172.16.4.52:50867 Warning: RC4 not available on client, attack might not work Listening for new connection Downgrading authentication options from 11 to 3 Enable SSL Exception in thread Thread-1: Traceback (most recent call last): File "/usr/lib/python3.10/threading.py", line 1016, in _bootstrap_inner self.run() File "/root/seth/seth/main.py", line 46, in run self.enableSSL() File "/root/seth/seth/main.py", line 165, in enableSSL ctx.sni_callback = sni_callback ValueError: sni_callback cannot be set on TLS_CLIENT context

bushdav commented 1 year ago

Having the same issue @AdrianVollmer , If you can take a look at the same

ekinsipahi commented 1 year ago

Having the same issue @AdrianVollmer , If you can take a look at the same

Can you give a link I'm getting the same exception

shemaloic commented 1 year ago

Having the same issue @AdrianVollmer , If you can take a look at the same

I am having the same exception too.

spameier commented 1 year ago

Hello @pipomambo, @bushdav, @ekinmanyak123, @shemaloic

Could you try PR #56? I think the issue is caused by ssl.PROTOCOL_TLS_CLIENT which was added in Python 3.6.

bushdav commented 1 year ago

Hi @spameier , It has worked on my end , Thank you!