Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
The idea was awesome, but this project is now death. The latest version of Empire Framework had some changes and now, when try to connect with empire Rest API, the server receives an invalid HTTP from deathstart
If you execute this:
deathstar -u empireadmin -p password123
In the Empire's console you will see this:
[WARNING]: Invalid HTTP request received.
Traceback (most recent call last):
File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/uvicorn/protocols/http/h11_impl.py", line 136, in handle_events
event = self.conn.next_event()
^^^^^^^^^^^^^^^^^^^^^^
File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 487, in next_event
exc._reraise_as_remote_protocol_error()
File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_util.py", line 77, in _reraise_as_remote_protocol_error
raise self
File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 469, in next_event
event = self._extract_next_receive_event()
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 411, in _extract_next_receive_event
event = self._reader(self._receive_buffer)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_readers.py", line 79, in maybe_read_from_IDLE_client
raise LocalProtocolError("illegal request line")
h11._util.RemoteProtocolError: illegal request line
The idea was awesome, but this project is now death. The latest version of Empire Framework had some changes and now, when try to connect with empire Rest API, the server receives an invalid HTTP from deathstart
If you execute this:
deathstar -u empireadmin -p password123
In the Empire's console you will see this:
[WARNING]: Invalid HTTP request received. Traceback (most recent call last): File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/uvicorn/protocols/http/h11_impl.py", line 136, in handle_events event = self.conn.next_event() ^^^^^^^^^^^^^^^^^^^^^^ File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 487, in next_event exc._reraise_as_remote_protocol_error() File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_util.py", line 77, in _reraise_as_remote_protocol_error raise self File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 469, in next_event event = self._extract_next_receive_event() ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_connection.py", line 411, in _extract_next_receive_event event = self._reader(self._receive_buffer) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/thehackerway/Empire/.venv/lib/python3.11/site-packages/h11/_readers.py", line 79, in maybe_read_from_IDLE_client raise LocalProtocolError("illegal request line") h11._util.RemoteProtocolError: illegal request line