Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added new commands in data/cheats #87

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

sec-fortress
Copy link

Added a new hash identifier folder with hash function identifiers (hashid and nth), then added impacket-mssqlclient on data/cheats


% impacket, windows, exec, inital_access

Mssqlclient.py is an MSSQL client, supporting both SQL and Windows Authentications (including hashes) allowing the enumeration for Microsoft SQL servers including spawning an 'xp_cmdshell'. It also supports TLS.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi, thanks for the pull request ! 👍

Can you remove this line, as it is interpreted by Arsenal please ?

Comment on lines +22 to +28
## Allow for the SQL Server instance without password
#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT

```
mssqlclient.py <DOMAIN>/<USERNAME>:<PASSWORD>@<IP> -no-pass
```

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you remove this one, as we will not put all of the different commands in arsenal

Comment on lines +43 to +48
## Attempts to use the IP address of the domain controller to be used for authentication
#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT

```
mssqlclient.py <DOMAIN>/<USERNAME>:<PASSWORD>@<IP> -dc-ip <IP>
```
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This one is not really useful in my opinion, could you also remove it ?

Comment on lines +6 to +8
Example : hashid '5f4dcc3b5aa765d61d8327deb882cf99'

https://github.com/blackploit/hash-identifier
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It will also be interpreted by arsenal, could you remove this part ?

#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT

```
mssqlclient.py <DOMAIN>/<USERNAME>:<PASSWORD>@<IP> -k
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think that for kerberos authentication, password is not needed, and the option -no-pass could be added

hashid '<hash-value>' -m
```

## Print hashes in joh mode
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

john instead of joh

hashid '<hash-value>' -j
```

## write output to file
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you capitalize the first word please ? 😄

## Write output to file


#plateform/linux #target/local #cat/HASHES/HASH_TYPE_IDENTIFIER

https://github.com/HashPals/Name-That-Hash
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you remove it, it might cause unintended behaviors from Arsenal

Comment on lines +34 to +37
## Enable verbosity/debug logs
```
nth --text '<hash-value>' -v
```
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do not think this one is useful, could you remove it ? 😄


## Decode hashes in base64
```
nth --text '<base6d_encoded_hash>' -b64
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do you mean base64_encoded_hash ?

@sec-fortress
Copy link
Author

Will make amendment to all said changes and re-commit, Thanks

@v1k1ngfr
Copy link
Collaborator

Hello @sec-fortress , thanks for your contrib !
The review is planed during November, we will take a look at your PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants