SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Debian Buster: OpenSSL has TLSv1.{0,1} disabled by default, problems with Python API

lgcambero opened this issue · comments

Connection received from 192.168.1.14
Enable SSL
Traceback (most recent call last):
File "/root/GitHub/Seth/rdp-cred-sniffer.py", line 821, in
run()
File "/root/GitHub/Seth/rdp-cred-sniffer.py", line 803, in run
enableSSL()
File "/root/GitHub/Seth/rdp-cred-sniffer.py", line 729, in enableSSL
certfile=args.certfile,
File "/usr/lib/python3.5/ssl.py", line 1077, in wrap_socket
ciphers=ciphers)
File "/usr/lib/python3.5/ssl.py", line 760, in init
self.do_handshake()
File "/usr/lib/python3.5/ssl.py", line 996, in do_handshake
self._sslobj.do_handshake()
File "/usr/lib/python3.5/ssl.py", line 641, in do_handshake
self._sslobj.do_handshake()
ssl.SSLError: [SSL: VERSION_TOO_LOW] version too low (_ssl.c:719)
[] Cleaning up...
[
] Done.
root@lgcambero:~/GitHub/Seth# openssl version
OpenSSL 1.1.0f 25 May 2017

Any idea? Tks.

What version is the client? (Check the properties of mstsc.exe.) Looks like the client wants to use an SSL version that the current version of openssl does not support. If you can, feel free to record the network traffic with wireshark or tcpdump and send me the pcap file.

Hi, obviously it is the OpenSSL version, since the error was submitted after updating the system.
I already solved it using an earlier version of OpenSSL.
I invite you to look:
Https://www.youtube.com/watch?v=wMTYLc8ajPw
Good job. Greetings.

Awesome video, thanks!

Just FYI, I also encountered this issue and is has to do with this.

I filed a bug report with the python devs, and they involved a Debian maintainer.

Latest commit fixed this as well