byt3bl33d3r / CrackMapExec

A swiss army knife for pentesting networks
BSD 2-Clause "Simplified" License
8.37k stars 1.64k forks source link

Unable to fetch the latest Invoke-VNC #354

Closed blshkv closed 4 years ago

blshkv commented 4 years ago
 * Repository id: byt3bl33d3r_CrackMapExec.git
 * To override fetched repository properties, use:
 *   EGIT_OVERRIDE_REPO_BYT3BL33D3R_CRACKMAPEXEC
 *   EGIT_OVERRIDE_BRANCH_BYT3BL33D3R_CRACKMAPEXEC
 *   EGIT_OVERRIDE_COMMIT_BYT3BL33D3R_CRACKMAPEXEC
 *   EGIT_OVERRIDE_COMMIT_DATE_BYT3BL33D3R_CRACKMAPEXEC
 * 
 * Fetching https://github.com/byt3bl33d3r/CrackMapExec.git ...
git fetch https://github.com/byt3bl33d3r/CrackMapExec.git +HEAD:refs/git-r3/HEAD
git update-ref --no-deref refs/git-r3/net-analyzer/crackmapexec/0/__main__ a20d28a885653f335e27d6b2ecd5353f322f8b28
 * Using submodule cme/data/invoke-vnc
 * Using submodule cme/data/mimikittenz
 * Using submodule cme/data/powersploit
 * Using submodule cme/data/invoke-obfuscation
 * Using submodule cme/data/netripper
 * Using submodule cme/data/randomps-scripts
 * Using submodule cme/data/cme_powershell_scripts
 * Using submodule cme/data/sessiongopher
 * Using submodule cme/data/mimipenguin
 * Skipping submodule cme/thirdparty/pywerview
 * Using submodule cme/data/RID-Hijacking
 * Repository id: artkond_Invoke-Vnc.git
 * To override fetched repository properties, use:
 *   EGIT_OVERRIDE_REPO_ARTKOND_INVOKE_VNC
 *   EGIT_OVERRIDE_BRANCH_ARTKOND_INVOKE_VNC
 *   EGIT_OVERRIDE_COMMIT_ARTKOND_INVOKE_VNC
 *   EGIT_OVERRIDE_COMMIT_DATE_ARTKOND_INVOKE_VNC
 * 
 * Fetching https://github.com/artkond/Invoke-Vnc ...
git fetch https://github.com/artkond/Invoke-Vnc --prune +refs/heads/*:refs/heads/* +refs/tags/*:refs/tags/* +refs/notes/*:refs/notes/* +HEAD:refs/git-r3/HEAD
git update-ref --no-deref refs/git-r3/net-analyzer/crackmapexec/0/cme_data_invoke-vnc/__main__ b32be0c1d824cc5c456d89b104159289bf916f84
fatal: update_ref failed for ref 'refs/git-r3/net-analyzer/crackmapexec/0/cme_data_invoke-vnc/__main__': cannot update ref 'refs/git-r3/net-analyzer/crackmapexec/0/cme_data_invoke-vnc/__main__': trying to write ref 'refs/git-r3/net-analyzer/crackmapexec/0/cme_data_invoke-vnc/__main__' with nonexistent object b32be0c1d824cc5c456d89b104159289bf916f84
blshkv commented 4 years ago

I think you linked that directory to the commit 1e8cd73a26c33c200590943214f78c5395b79a13 in a pull request. Is it really allowed? Can you just fork it if the project is dead?

mpgn commented 4 years ago

The project exist withing the Invoke-vnc project (git magic) https://github.com/klsecservices/Invoke-Vnc/tree/b32be0c1d824cc5c456d89b104159289bf916f84

But the fetch doesn't try to 'fetch' the Pull request, I guess you can also add this line +refs/pull/*/merge:refs/remotes/origin/pr/* to the fetch of Invoke-VNC.

For the record, I use this same trick if i remember to pyverview project.

blshkv commented 4 years ago

Not sure that it would help. I'm writing an ebuild and I don't think I can do "low level" git stuff under Gentoo. Having recursive modules was already almost against a policy.... Let's hope they will accept the pull request soon.

FYI, I did not face any issues with pyverview before.

mpgn commented 4 years ago

Ok I will keep open the issue, if they don't PR until june I will switch to the forked repo

blshkv commented 4 years ago

I don't think the project is alive and your pull request https://github.com/klsecservices/Invoke-Vnc/pull/2 would be merged. It were 5 commits on 9 Feb 2017 and it were no activity since then.

mpgn commented 4 years ago

It's merged, I need to switch to the master branch

blshkv commented 4 years ago

Yes please. I was very surprised to see that

mpgn commented 4 years ago

Done in master :)