Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Steal only one set of hash then passthrough #376

Open
obilodeau opened this issue Nov 26, 2021 · 0 comments
Open

Steal only one set of hash then passthrough #376

obilodeau opened this issue Nov 26, 2021 · 0 comments
Labels
enhancement New feature or request
Milestone

Comments

@obilodeau
Copy link
Member

Our current NTLM capture mode is disruptive if used during a pentest because a MITM-ed client will not be able to reach the intended server at all. The type of things you need to avoid in pentests at all costs.

It would be nice if we could have knowledge about which destination server we already stolen a hash from and then enter a complete passthrough mode for these.

@obilodeau obilodeau added the enhancement New feature or request label Nov 26, 2021
@obilodeau obilodeau added this to the v1.3.0 milestone Nov 26, 2021
@obilodeau obilodeau modified the milestones: v1.3.0, v2.1.0 Dec 14, 2023
@obilodeau obilodeau modified the milestones: v2.1.0, v2.2.0 Jan 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant