Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[EXP: test with aardwolf] [xfreerdp] Open pandorabox... #6

Draft
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

XiaoliChan
Copy link
Contributor

U know what that means...

Comparison:
image

@NeffIsBack NeffIsBack added enhancement New feature or request bug-fix This Pull Request fixes a bug labels Sep 9, 2023
@Marshall-Hallenbeck
Copy link
Collaborator

@XiaoliChan What exactly is the point of adding an alternative RDP procotol? From the looks of it this is just a popen to xfreerdp which doesn't make much sense to add in. Protocols should be as low level as possible, but this just hooks another very high level tool.

@XiaoliChan
Copy link
Contributor Author

XiaoliChan commented Sep 9, 2023

@Marshall-Hallenbeck This is a simple test, because I found "aardwolf" will miss lots of RDP targets when I use it in real-world attack, I should convert this PR to a draft

@NeffIsBack Hope you can play with it.

@XiaoliChan XiaoliChan changed the title [rdp] Open pandorabox... TEST: [rdp] Open pandorabox... Sep 9, 2023
@XiaoliChan XiaoliChan marked this pull request as draft September 9, 2023 13:44
@Marshall-Hallenbeck
Copy link
Collaborator

@XiaoliChan I think we should focus on fixing that with aardwolf, or some other low level library, then. The problem with this, is it creates a dependency on another binary, xfreerdp, and that won't work on Windows or MacOS...

@XiaoliChan
Copy link
Contributor Author

@Marshall-Hallenbeck yes, you are right, so this PR also can use compare the results with aardwolf’s results, that why I mark it as “test”

@Marshall-Hallenbeck
Copy link
Collaborator

@XiaoliChan That sounds good to me

@XiaoliChan XiaoliChan changed the title TEST: [rdp] Open pandorabox... [EXP test with aardwolf] [xfreerdp] Open pandorabox... Sep 10, 2023
@XiaoliChan XiaoliChan changed the title [EXP test with aardwolf] [xfreerdp] Open pandorabox... [EXP: test with aardwolf] [xfreerdp] Open pandorabox... Sep 10, 2023
@bongobongoland
Copy link
Contributor

You can use xfreerdp for Windows - wfreerdp. I use it often.

@bongobongoland
Copy link
Contributor

by the looks of it, rdp can't bruteforce older Windows hosts and can't connect to some of them (.131)?

@XiaoliChan
Copy link
Contributor Author

by the looks of it, rdp can't bruteforce older Windows hosts and can't connect to some of them (.131)?

I test it, it can brute force the older windows hosts

@bongobongoland
Copy link
Contributor

I'm referring to your screenshot. xfreerdp can connect to .131 , but nxc can't connect and also can't bruteforce .130

@XiaoliChan
Copy link
Contributor Author

I'm referring to your screenshot. xfreerdp can connect to .131 , but nxc can't connect and also can't bruteforce .130

Ah, yes, aardwolf is not stable, so it can't bruteforce 130, but xfreerdp can

@XiaoliChan
Copy link
Contributor Author

@Marshall-Hallenbeck I think it can be like core argument in rdp protocol
nxc rdp 192.168.1.1 -u xiaoli -p 111qqq... --core xfreerdp

Signed-off-by: XiaoliChan <30458572+XiaoliChan@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug-fix This Pull Request fixes a bug enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants