SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Error message "BrokenPipeError: [Errno 32] Broken pipe"

RoseDeSable opened this issue · comments

Hi,
in some cases I receive an error, but the attack functions:

Tamper with NTLM response
TLS alert access denied, Downgrading CredSSP
Connection received from myPCasVictim:64766
Warning: RC4 not available on client, attack might not work
Listening for new connection
Server enforces NLA; switching to 'fake server' mode
Enable SSL
Connection lost on enableSSL: [Errno 104] Connection reset by peer
Hiding forged protocol request from client
Exception in thread Thread-2:
Traceback (most recent call last):
File "/usr/lib/python3.7/threading.py", line 926, in _bootstrap_inner
self.run()
File "/root/Seth/seth/main.py", line 49, in run
self.run_fake_server()
File "/root/Seth/seth/main.py", line 100, in run_fake_server
(id, id)))
File "/usr/lib/python3.7/ssl.py", line 1003, in send
return self._sslobj.write(data)
BrokenPipeError: [Errno 32] Broken pipe

I have no effort by changing MinProtocol from TLSv1.2 to TLSv1.0

Same as #28