Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

No Event Log in patched DC after script execution #16

Open
LaBonave opened this issue Sep 17, 2020 · 12 comments
Open

No Event Log in patched DC after script execution #16

LaBonave opened this issue Sep 17, 2020 · 12 comments

Comments

@LaBonave
Copy link

Hi,
when running this script against a enforced + patched system, I got a "Attack failed. Target is probably patched.", after 30 seconds and a bunches of "=" signs. but no event log at all (5829,5827,5828,5830,5831) were recorded.
Is that expected ?

@djrevmoon
Copy link
Contributor

You would expect 5827 and 5828, but not the others.

@LaBonave
Copy link
Author

Thanks...what bothers me is that I get none (I just pasted the whole Filter I put in place when the patch + Enforcement.

@djrevmoon
Copy link
Contributor

Actually you say that it takes 30 seconds to get that output. This would indicate a connection problem. Normally the attack takes 3 seconds. A connection problem would explain the absence of events also.

@LaBonave
Copy link
Author

LaBonave commented Sep 18, 2020

Sorry to ask for a reopening :
There is no connection problem because if I activate an IPS rule on the DC specifically for this attack, it is seen and blocked, and the scripts predictably ends with a ConnectionResetError: [Errno 104] Connection reset by peer.
If I disable any IPS I get that and no event in the DC .
Performing authentication attempts...== (...)===================================================================================================================
Attack failed. Target is probably patched.

tcpdump shows connectivity
15:59:40.896332 IP attack.lan.45166 > DC.lan.epmap: Flags [.], ack 1, win 229, options [nop,nop,TS val 470811279 ecr 735278428], length 0
15:59:40.896829 IP attack.lan.45166 > DC.lan.epmap: Flags [P.], seq 1:73, ack 1, win 229, options [nop,nop,TS val 470811280 ecr 735278428], length 72
15:59:40.897145 IP DC.lan.epmap > Attack.lan.45166: Flags [P.], seq 1:61, ack 73, win 260, options [nop,nop,TS val 735278429 ecr 470811280], length 60

@djrevmoon
Copy link
Contributor

Could you send a pcap of the attack?

@djrevmoon djrevmoon reopened this Sep 18, 2020
@ryanlund4
Copy link

Are you getting an access denied error on the DC?
Error 5805

@bazcurtis
Copy link

I am seeing the same thing. I do see a 5805, but no 5827 or 5728

@ryanlund4
Copy link

ryanlund4 commented Sep 23, 2020 via email

@LaBonave
Copy link
Author

Hi
I have a couple of 5805 but in my case, not at each script exec (half of the times only)

5805
"The session setup from the computer xxx failed to authenticate. The following error occurred:
Access is denied."

@bazcurtis
Copy link

Thanks for the reply. Are you saying that when you run the script you see the 5827 event?

@LaBonave
Copy link
Author

Hi
no, I only see (half of the attempts) 5805. I opened this issue because I never see a 5827 when trying against a patched AND enforced DC.

@bazcurtis
Copy link

I tested this on an unpatched DC and I got a 5805, but script said it was patched. The patch is queued for install, but not installed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants
@LaBonave @djrevmoon @bazcurtis @ryanlund4 and others