@@ -39,14 +39,16 @@ pyWhisker supports the following authentications:
3939 - (Kerberos) Cleartext password
4040 - (Kerberos) [ Pass-the-key] ( https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-key ) / [ Overpass-the-hash] ( https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/overpass-the-hash )
4141 - (Kerberos) [ Pass-the-cache] ( https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-cache ) (type of [ Pass-the-ticket] ( https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-ticket ) )
42+ - (LDAP over Schannel) [ Pass-the-cert] ( https://www.thehacker.recipes/ad/movement/schannel/passthecert )
4243
4344Among other things, pyWhisker supports multi-level verbosity, just append ` -v ` , ` -vv ` , ... to the command :)
4445
4546pyWhisker can also do cross-domain, see the ` -td/--target-domain ` argument.
4647
4748```
48- usage: pywhisker.py [-h] (-t TARGET_SAMNAME | -tl TARGET_SAMNAME_LIST) [-a [{list,add,spray,remove,clear,info,export,import}]] [--use-ldaps] [-v] [-q] [--dc-ip ip address] [-d DOMAIN]
49- [-u USER] [-td TARGET_DOMAIN] [--no-pass | -p PASSWORD | -H [LMHASH:]NTHASH | --aes-key hex key] [-k] [-P PFX_PASSWORD] [-f FILENAME] [-e {PEM,PFX}] [-D DEVICE_ID]
49+ usage: pywhisker [-h] (-t TARGET_SAMNAME | -tl TARGET_SAMNAME_LIST) [-a [{list,add,spray,remove,clear,info,export,import}]] [--use-ldaps] [--use-schannel] [-v] [-q]
50+ [--dc-ip ip address] [-d DOMAIN] [-u USER] [-crt CERTFILE] [-key KEYFILE] [-td TARGET_DOMAIN] [--no-pass | -p PASSWORD | -H [LMHASH:]NTHASH | --aes-key hex key]
51+ [-k] [-P PFX_PASSWORD] [-f FILENAME] [-e {PEM,PFX}] [-D DEVICE_ID]
5052
5153Python (re)setter for property msDS-KeyCredentialLink for Shadow Credentials attacks.
5254
@@ -59,6 +61,7 @@ optional arguments:
5961 -a [{list,add,spray,remove,clear,info,export,import}], --action [{list,add,spray,remove,clear,info,export,import}]
6062 Action to operate on msDS-KeyCredentialLink
6163 --use-ldaps Use LDAPS instead of LDAP
64+ --use-schannel Use LDAP Schannel (TLS) for certificate-based authentication
6265 -v, --verbose verbosity level (-v for verbose, -vv for debug)
6366 -q, --quiet show no information at all
6467
@@ -67,6 +70,10 @@ authentication & connection:
6770 -d DOMAIN, --domain DOMAIN
6871 (FQDN) domain to authenticate to
6972 -u USER, --user USER user to authenticate with
73+ -crt, --certfile CERTFILE
74+ Path to the user certificate (PEM format) for Schannel authentication
75+ -key, --keyfile KEYFILE
76+ Path to the user private key (PEM format) for Schannel authentication
7077 -td TARGET_DOMAIN, --target-domain TARGET_DOMAIN
7178 Target domain (if different than the domain of the authenticating user)
7279
0 commit comments