byt3bl33d3r / DeathStar

Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
GNU General Public License v3.0
1.57k stars 331 forks source link

rename to DeathProject #86

Open Adastra-thw opened 10 months ago

Adastra-thw commented 10 months ago

The idea was awesome, but this project is now death. The latest version of Empire Framework had some changes and now, when try to connect with empire Rest API, the server receives an invalid HTTP from deathstart

If you execute this:

deathstar -u empireadmin -p password123

In the Empire's console you will see this:

[WARNING]: Invalid HTTP request received. Traceback (most recent call last): File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/uvicorn/protocols/http/h11_impl.py", line 136, in handle_events event = self.conn.next_event() ^^^^^^^^^^^^^^^^^^^^^^ File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 487, in next_event exc._reraise_as_remote_protocol_error() File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_util.py", line 77, in _reraise_as_remote_protocol_error raise self File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 469, in next_event event = self._extract_next_receive_event() ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 411, in _extract_next_receive_event event = self._reader(self._receive_buffer) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_readers.py", line 79, in maybe_read_from_IDLE_client raise LocalProtocolError("illegal request line") h11._util.RemoteProtocolError: illegal request line