SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections
MIT License
1.39k stars 324 forks source link

Hash not always crackable by John The Ripper #6

Closed AdrianVollmer closed 7 years ago

AdrianVollmer commented 7 years ago

These cases work:

Debug Log (Windows 7 Client 6.3.9600 rdp 8.1) (Server Windows 10 10.0.14393 + NLA) (Login: admin / admin123456) -> https://pastebin.com/A9RNLEKx

Server 2008 R2 6.1.7601 Certificate TLSv1 + AES128-SHA: Debug Log (Client Windows 7 / 10) -> https://pastebin.com/SWbUEEK4

(Server Windows 2008 R2 6.1.7601 NO NLA Certificate TLSv1 + AES128-SHA Login Debug Log (Windows 7 / 10 Client) chris1:remoteuser!123456 ) -> https://pastebin.com/K8S6Mz36

These do not:

Server Windows 10 10 10.0.14393 Certificate TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384: Debug Log (Windows 10 Client 10.0.10586 rdp 10.0) (Server Windows 10 10.0.14393 + NLA) (Login: admin / admin123456) -> https://pastebin.com/pGPMxemG

Server Windows 2012 R2 6.3.9600 TLSv1.2 + ECDHE-RSA-AES256-SHA384: Debug Log (Client Windows 7 / 10 Login: Administrator / admin-123456) -> https://pastebin.com/Ar8Lb8pK