feat: Added CredSSP support when private key is known #229
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This pull request adds a
--auth
switch that allows to selectively enable the authentication mechanisms that PyRDP will allow through. For now these only includetls
andssp
with some strict limitations for CredSSP.It also finally documents how to extract the private key of RDP servers so that we can close #154
Also resolves #134.
Details
In practice, this means that the only purpose of this feature is to allow honeypots to expose CredSSP. Note that usage of CredSSP means credential stuffing is not possible since a secret key is derived from the NTLM hash of the credentials.
Future Work
This pull-request also paves the way towards supporting other authentication techniques such as Early User Authorization (EUA), but that is not yet implemented.