SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Problem with OpenSSL and Dsniff

NILS-IT-OT-SEC opened this issue · comments

commented

Hello,
I guess I need a lower OpenSSL Version, so I downgraded it from 3.0.8 to 1.1.1.
After installing dsniff it is again version 3.0.8. Obviously the dsniff installation does a automatically openssl update.

Has anybody an idea?

PS: The result after establishing rdp connection looks like that:

╚══════╝╚══════╝ ╚═╝ ╚═╝ ╚═╝
[] Linux OS detected, using iptables as the netfilter interpreter
[
] Spoofing arp replies...
[] Turning on IP forwarding...
[
] Set iptables rules for SYN packets...
[] Waiting for a SYN packet to the original destination...
[+] Got it! Original destination is 192.168.2.100
[
] Clone the x509 certificate of the original destination...
[] Adjust iptables rules for all packets...
[
] Run RDP proxy...
Listening for new connection