p3nt4 / Invoke-SocksProxy

Socks proxy, and reverse socks server using powershell.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

error

gitbotezok opened this issue · comments

Hello!
I've got this error when i try to do reverse shell from my windows vps to linux vps

[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)
[SSL] internal error (_ssl.c:1124)

how to fix it ?

The issue is TLSv1 is deprecated and no longer used. You need to switch it to TLS_SERVER

In ReverseSocksProxyHandler.py change line 16 to be ssl.PROTOCOL_TLS_SERVER

The issue is TLSv1 is deprecated and no longer used. You need to switch it to TLS_SERVER

In ReverseSocksProxyHandler.py change line 16 to be ssl.PROTOCOL_TLS_SERVER

i changed what you said to change,now the printout is "[SSL: UNSUPPORTED_PROTOCOL] unsupported protocol (_ssl.c:1124)

What version of python are you running?

What version of python are you running?
ls /usr/bin | grep python
python3
python3.8

Python SSL Docs

You can try PROTOCOL_TLS but this has been deprecated in newer versions of python

[SSL: UNSUPPORTED_PROTOCOL] unsupported protocol (_ssl.c:1124)
i've got the same issue
[SSL: UNSUPPORTED_PROTOCOL] unsupported protocol (_ssl.c:1124)

any ideas how to fix it, or what to replace/change?

Python SSL Docs

You can try PROTOCOL_TLS but this has been deprecated in newer versions of python

or maybe you know useful and easy to use alternative for this?

Can try reverting it back to the old tls and make sure you the certFingerprint is correct

Can try reverting it back to the old tls and make sure you the certFingerprint is correct

Okay, i reverted it back. Sorry for stypid question, but i am just a beginner in it. how to check if certFingerprint is correct?

First create the certs
openssl req -x509 -nodes -days 3650 -newkey rsa:2048 -keyout private.key -out cert.pem

Then to get the fingerprint type
openssl x509 -in cert.pem -noout -sha1 -fingerprint | cut -d "=" -f 2 | tr -d ":"

okay, i did it, got somethin like "18E82BC42325DD02121115D35961D0F5292E"
now to do same steps in faq?

First create the certs openssl req -x509 -nodes -days 3650 -newkey rsa:2048 -keyout private.key -out cert.pem

Then to get the fingerprint type openssl x509 -in cert.pem -noout -sha1 -fingerprint | cut -d "=" -f 2 | tr -d ":"

okay, i did it, got somethin like "18E82BC42325DD02121115D35961D0F5292E"
now to do same steps in faq?

Correct

we are stuck in endless circle =)
[SSL] internal error (_ssl.c:1124)

Correct

thank you for your help anyway, god bless you

@gitbotezok changing the line 16 to context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER) should solve the problem

@gitbotezok changing the line 16 to context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER) should solve the problem

I can confirm this is not working on latest kali...

I also get UNSUPPORTED_PROTOCOL or NO_CIPHERS_AVAILABLE...

Tried changing the openssl conf file without success...

Anyone can help?

Thanks!

Works by using newest Kali at the time of writing + python2 + MinProtocol = TLSv1.0 in /etc/ssl/openssl.cnf.

Context is:

context = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
context.set_ciphers('DEFAULT:@SECLEVEL=1')