Closed GoogleCodeExporter closed 9 years ago
Hey Mate:
Thanks for the bug report.
Could you please edit secretsdump.py and uncomment the instances of:
#import traceback
#print traceback.print_exc()
run the script again and send me the output?
thanks!
Original comment by bet...@gmail.com
on 29 Aug 2014 at 5:21
Actually.. I'm attaching a modified version of secretsdump.py.. please use this
one and let me know if it works.
cheers
beto
Original comment by bet...@gmail.com
on 29 Aug 2014 at 5:30
Attachments:
hello there.
output:
[*] _SC_TlntSvr
Traceback (most recent call last):
File "C:\Python27\Scripts\secretsdump.py", line 1386, in dump
self.__LSASecrets.dumpSecrets()
File "C:\Python27\Scripts\secretsdump.py", line 1026, in dumpSecrets
self.__printSecret(key, secret)
File "C:\Python27\Scripts\secretsdump.py", line 946, in __printSecret
secret += strDecoded
TypeError: can only concatenate tuple (not "unicode") to tuple
None
[!] can only concatenate tuple (not "unicode") to tuple
[*] Cleaning up...
PS: Since this is a lab environment I'm attaching the files (SAM, SECURITY and
SYSTEM hives).
PS2: I forgot to mention the hive files are windows xp and the execution is
taking place on W2k8 r2.
Thanks for the assistance. If you need any help let me know.
Original comment by myk...@gmail.com
on 29 Aug 2014 at 5:38
Attachments:
Hey mate..
thanks for the files!.. much appreciated.
Oka.. it's fixed at https://code.google.com/p/impacket/source/detail?r=1258
if you don't want to check out the file, just take a look at the diff.. just
remove the trailing comma at the end of line 945.
BTW, when running secretsdump.py as LOCAL, you won't get the username for the
vulnerable service. If you want to know the username run it remotely (it needs
to connect to the target's Service Control Manager to get the username).
hope this helps!
thanks again for reporting this issue and please confirm it's working on your
side so I close this one.
Original comment by bet...@gmail.com
on 29 Aug 2014 at 5:49
thanks doc!
very nice work indeed!
Original comment by myk...@gmail.com
on 29 Aug 2014 at 5:54
thanks!
happy hacking ;)
cheers,
beto
Original comment by bet...@gmail.com
on 29 Aug 2014 at 5:57
Original issue reported on code.google.com by
myk...@gmail.com
on 29 Aug 2014 at 5:17