Skip to content

Commit b0d8e46

Browse files
authored
Merge pull request #24 from JPG0mez/main
Added support to use PassTheCert
2 parents 9f2fdc0 + 060fd09 commit b0d8e46

File tree

2 files changed

+149
-115
lines changed

2 files changed

+149
-115
lines changed

README.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,14 +39,16 @@ pyWhisker supports the following authentications:
3939
- (Kerberos) Cleartext password
4040
- (Kerberos) [Pass-the-key](https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-key) / [Overpass-the-hash](https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/overpass-the-hash)
4141
- (Kerberos) [Pass-the-cache](https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-cache) (type of [Pass-the-ticket](https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-ticket))
42+
- (LDAP over Schannel) [Pass-the-cert](https://www.thehacker.recipes/ad/movement/schannel/passthecert)
4243

4344
Among other things, pyWhisker supports multi-level verbosity, just append `-v`, `-vv`, ... to the command :)
4445

4546
pyWhisker can also do cross-domain, see the `-td/--target-domain` argument.
4647

4748
```
48-
usage: pywhisker.py [-h] (-t TARGET_SAMNAME | -tl TARGET_SAMNAME_LIST) [-a [{list,add,spray,remove,clear,info,export,import}]] [--use-ldaps] [-v] [-q] [--dc-ip ip address] [-d DOMAIN]
49-
[-u USER] [-td TARGET_DOMAIN] [--no-pass | -p PASSWORD | -H [LMHASH:]NTHASH | --aes-key hex key] [-k] [-P PFX_PASSWORD] [-f FILENAME] [-e {PEM,PFX}] [-D DEVICE_ID]
49+
usage: pywhisker [-h] (-t TARGET_SAMNAME | -tl TARGET_SAMNAME_LIST) [-a [{list,add,spray,remove,clear,info,export,import}]] [--use-ldaps] [--use-schannel] [-v] [-q]
50+
[--dc-ip ip address] [-d DOMAIN] [-u USER] [-crt CERTFILE] [-key KEYFILE] [-td TARGET_DOMAIN] [--no-pass | -p PASSWORD | -H [LMHASH:]NTHASH | --aes-key hex key]
51+
[-k] [-P PFX_PASSWORD] [-f FILENAME] [-e {PEM,PFX}] [-D DEVICE_ID]
5052
5153
Python (re)setter for property msDS-KeyCredentialLink for Shadow Credentials attacks.
5254
@@ -59,6 +61,7 @@ optional arguments:
5961
-a [{list,add,spray,remove,clear,info,export,import}], --action [{list,add,spray,remove,clear,info,export,import}]
6062
Action to operate on msDS-KeyCredentialLink
6163
--use-ldaps Use LDAPS instead of LDAP
64+
--use-schannel Use LDAP Schannel (TLS) for certificate-based authentication
6265
-v, --verbose verbosity level (-v for verbose, -vv for debug)
6366
-q, --quiet show no information at all
6467
@@ -67,6 +70,10 @@ authentication & connection:
6770
-d DOMAIN, --domain DOMAIN
6871
(FQDN) domain to authenticate to
6972
-u USER, --user USER user to authenticate with
73+
-crt, --certfile CERTFILE
74+
Path to the user certificate (PEM format) for Schannel authentication
75+
-key, --keyfile KEYFILE
76+
Path to the user private key (PEM format) for Schannel authentication
7077
-td TARGET_DOMAIN, --target-domain TARGET_DOMAIN
7178
Target domain (if different than the domain of the authenticating user)
7279

0 commit comments

Comments
 (0)