When running an ldap attack on a domain, one can encounter a large number of ldap shells being created. It is not always easy to tell which shell is using which relayed account when there are 100 shells.
I made extremely minor tweaks to:
Add the ability to reference the domain from __init__
Add the domain and username to the interactive shell info log
When running an ldap attack on a domain, one can encounter a large number of ldap shells being created. It is not always easy to tell which shell is using which relayed account when there are 100 shells.
I made extremely minor tweaks to:
__init__