You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/metasploit-framework.wiki/kerberos/service_authentication.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,7 +142,7 @@ Optional options:
142
142
*`read-only` -- Stored tickets from the cache will be used, but no new tickets are stored.
143
143
*`write-only` -- New tickets are requested and they are stored for reuse.
144
144
*`read-write` -- Stored tickets from the cache will be used and new tickets will be stored for reuse.
145
-
*`${Prefix}KrbOfferedEncryptionTypes' -- The list of encryption types presented to the KDC as being supported by the Metasploit client. i.e. `SmbKrbOfferedEncryptionTypes=AES256`
145
+
*`${Prefix}KrbOfferedEncryptionTypes` -- The list of encryption types presented to the KDC as being supported by the Metasploit client. i.e. `SmbKrbOfferedEncryptionTypes=AES256`
wlog("Filtered credential #{file_path} ##{index} reason: SPN (#{sname_hostname}) hostname does not match (spn: #{credential.server.components.snapshot.join('/')})")
1139
+
filter_reason="Filtered credential #{path} ##{index} reason: SPN (#{sname_hostname}) hostname does not match (spn: #{credential.server.components.snapshot.join('/')})"
Msf::OptPath.new('LDAP::CertFile',[false,'The path to the PKCS12 (.pfx) certificate file to authenticate with'],conditions: ['LDAP::Auth','==',Msf::Exploit::Remote::AuthOption::SCHANNEL]),
43
+
Msf::OptPkcs12Cert.new('LDAP::CertFile',[false,'The path to the PKCS12 (.pfx) certificate file to authenticate with'],conditions: ['LDAP::Auth','==',Msf::Exploit::Remote::AuthOption::SCHANNEL]),
44
44
OptFloat.new('LDAP::ConnectTimeout',[true,'Timeout for LDAP connect',10.0]),
45
45
OptEnum.new('LDAP::Signing',[true,'Use signed and sealed (encrypted) LDAP','auto',%w[disabledautorequired]])
46
46
]
47
47
)
48
48
end
49
49
50
+
50
51
# Alias to return the RHOST datastore option.
51
52
#
52
53
# @return [String] The current value of RHOST in the datastore.
@@ -68,21 +69,23 @@ def peer
68
69
"#{rhost}:#{rport}"
69
70
end
70
71
72
+
71
73
# Set the various connection options to use when connecting to the
72
74
# target LDAP server based on the current datastore options. Returns
73
75
# the resulting connection configuration as a hash.
74
76
#
75
77
# @return [Hash] The options to use when connecting to the target
0 commit comments