Skip to content

broken NLA/SSP for all windows server versions #490

Open
@boredchilada

Description

@boredchilada

Hello,

Is this project still supported? I notice the further we go the more issues appear and not much answer to people with issues. Barely any updates etc...

as of march 30th 2025, NLA/SSP is basically non functional for any servers, I've tested PYRDP to -> 2016, 2019, 2022, 2025 from multiple different environments and as of yesterday, NLA/SSP does not work on any version of windows.

I was using the 1.2.0 version and NLA/SSP was working fine and all of a sudden yesterday PYRDP stopped working with NLA/SSP Pretty much universally. 2.1.0 plain and simple did not work with nla/ssp at all didnt matter the version of windows.

Yes my certs were extracted properly, yes i have port forwarding, i tested this in cloud environments, local environments , every environment is giving me issues

2.1.0 gets stuck and doesn't go through and just times out at configuring remote session. I have not done much investigation on this version yet.

find the logs for 1.2.0 where literally 5 days ago everything was working fine in the first snippet. I added much more debug logging in the second sni to try and find what's going on. I tried to add something to handle the EARLY_USER_AUTHORIZATION_RESULT

THE LOGS ARE FOR A 2022 SERVER MACHINE

[2025-03-25 03:24:19,217] - INFO - Margaret917984 - pyrdp.mitm.connections.x224 - Cookie: mstshash=Administr
[2025-03-25 03:24:19,233] - INFO - Margaret917984 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-25 03:24:19,234] - INFO - Emily888085 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-25 03:24:19,239] - INFO - Robert238265 - pyrdp.mitm.connections.ntlmssp - [!] NTLMSSP Hash: Administrator:::d23523d136a11bba:57838decfdca51ca00ba968bacbe56dc:010100000000000069b6010000000000000000000000000000000000020014004b0041005500460041004e00570041004c00540001001800410052004200450049005400450052002d004e004300310004001a006b0061007500660061006e00770061006c0074002e006400650003003400610072006200650069007400650072002d006e00630031002e006b0061007500660061006e00770061006c0074002e006400650005001a006b0061007500660061006e00770061006c0074002e0064006500070008001ecc1465359ddb0100000000
[2025-03-25 03:24:19,425] - INFO - Brittany183519 - pyrdp.mitm.connections.ntlmssp - [!] NTLMSSP Hash: Administrator:::b6774909e3aa8b88:52150d806d6b612981942524ecfcc7bb:010100000000000069b6010000000000000000000000000000000000020014004b0041005500460041004e00570041004c00540001001800410052004200450049005400450052002d004e004300310004001a006b0061007500660061006e00770061006c0074002e006400650003003400610072006200650069007400650072002d006e00630031002e006b0061007500660061006e00770061006c0074002e006400650005001a006b0061007500660061006e00770061006c0074002e006400650007000800e5112765359ddb0100000000
[2025-03-25 03:24:19,570] - INFO - Ronald686928 - pyrdp.mitm.connections.ntlmssp - [!] NTLMSSP Hash: administrator::red.act.ed:98023567e5feefe1:71142e954c0381dd28ca5c600f7b1cf9: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
[2025-03-25 03:24:19,691] - INFO - Ronald686928 - pyrdp.mitm.connections.mcs - Client hostname red.act.ed
[2025-03-25 03:24:19,696] - INFO - Ronald686928 - pyrdp.mitm.connections.mcs - rdpdr <---> Channel #1004
[2025-03-25 03:24:19,696] - INFO - Ronald686928 - pyrdp.mitm.connections.mcs - rdpsnd <---> Channel #1005
[2025-03-25 03:24:19,696] - INFO - Ronald686928 - pyrdp.mitm.connections.mcs - cliprdr <---> Channel #1006
[2025-03-25 03:24:19,696] - INFO - Ronald686928 - pyrdp.mitm.connections.mcs - drdynvc <---> Channel #1007
[2025-03-25 03:24:20,244] - INFO - Robert238265 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert access denied')]
[2025-03-25 03:24:21,006] - INFO - Ronald899967 - pyrdp.mitm.connections.tcp - New client connected from red:48564
[2025-03-25 03:24:21,016] - INFO - Ronald899967 - pyrdp.mitm.connections.x224 - Cookie: mstshash=red.act.ed
[2025-03-25 03:24:21,017] - INFO - Brittany183519 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert access denied')]
[2025-03-25 03:24:21,033] - INFO - Ronald899967 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-25 03:24:21,052] - INFO - Margaret917984 - pyrdp.mitm.connections.ntlmssp - [!] NTLMSSP Hash: Administrator:::e983b0093b00aa23:045ce084d9850b87744a430da0ba5448:010100000000000069b6010000000000000000000000000000000000020014004b0041005500460041004e00570041004c00540001001800410052004200450049005400450052002d004e004300310004001a006b0061007500660061006e00770061006c0074002e006400650003003400610072006200650069007400650072002d006e00630031002e006b0061007500660061006e00770061006c0074002e006400650005001a006b0061007500660061006e00770061006c0074002e006400650007000800323b2666359ddb0100000000
[2025-03-25 03:24:21,075] - INFO - Emily888085 - pyrdp.mitm.connections.ntlmssp - [!] NTLMSSP Hash: Administrator::red.act.ed:270a4fafc63cceac:ef5acba664a3e7cd9e5c31d904f72432:010100000000000069b6010000000000000000000000000000000000020014004b0041005500460041004e00570041004c00540001001800410052004200450049005400450052002d004e004300310004001a006b0061007500660061006e00770061006c0074002e006400650003003400610072006200650069007400650072002d006e00630031002e006b0061007500660061006e00770061006c0074002e006400650005001a006b0061007500660061006e00770061006c0074002e00640065000700080086902b66359ddb0100000000
[2025-03-25 03:24:22,792] - INFO - Sherry541158 - pyrdp.mitm.connections.tcp - New client connected from red.act.ed:30739
[2025-03-25 03:24:22,793] - INFO - Ronald686928 - pyrdp.mitm.connections.security - Client Info: username = 'administrator\x00', password = '\x00', domain = 'red.act.ed\x00', clientAddress = 'redact\x00'
[2025-03-25 03:24:22,802] - INFO - Sherry541158 - pyrdp.mitm.connections.x224 - Cookie: mstshash=red.act.ed
[2025-03-25 03:24:22,812] - INFO - Margaret917984 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert access denied')]
[2025-03-25 03:24:22,813] - INFO - Emily888085 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert access denied')]
[2025-03-25 03:24:22,822] - INFO - Sherry541158 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-25 03:24:23,934] - INFO - Gail544880 - pyrdp.mitm.connections.tcp - New client connected from red.act.ed:22921
[2025-03-25 03:24:25,325] - INFO - Anibal870656 - pyrdp.mitm.connections.tcp - New client connected from red.act.ed:37349
[2025-03-25 03:24:25,326] - INFO - Gail544880 - pyrdp.mitm.connections.x224 - Cookie: mstshash=Administr
[2025-03-25 03:24:25,326] - INFO - Anibal870656 - pyrdp.mitm.connections.x224 - Cookie: mstshash=red.act.ed
[2025-03-25 03:24:25,336] - INFO - Gail544880 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-25 03:24:25,336] - INFO - Anibal870656 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-25 03:24:25,425] - INFO - Sherry541158 - pyrdp.mitm.connections.ntlmssp - [!] NTLMSSP Hash: Administrator::red.act.ed:02828c3ad49cae46:818c55a3f043cb4c46694462555708a4:010100000000000069b6010000000000000000000000000000000000020014004b0041005500460041004e00570041004c00540001001800410052004200450049005400450052002d004e004300310004001a006b0061007500660061006e00770061006c0074002e006400650003003400610072006200650069007400650072002d006e00630031002e006b0061007500660061006e00770061006c0074002e006400650005001a006b0061007500660061006e00770061006c0074002e0064006500070008002975c268359ddb0100000000
[2025-03-25 03:24:26,377] - INFO - Ronald899967 - pyrdp.mitm.connections.ntlmssp - [!] NTLMSSP Hash: Administrator::red.act.ed:78a4d4fe2c16e518:d187b53b230ea505a682efdadabac417:010100000000000069b6010000000000000000000000000000000000020014004b0041005500460041004e00570041004c00540001001800410052004200450049005400450052002d004e004300310004001a006b0061007500660061006e00770061006c0074002e006400650003003400610072006200650069007400650072002d006e00630031002e006b0061007500660061006e00770061006c0074002e006400650005001a006b0061007500660061006e00770061006c0074002e00640065000700080035734d69359ddb0100000000
[2025-03-25 03:24:26,488] - INFO - Sherry541158 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert access denied')]
[2025-03-25 03:24:26,498] - INFO - Gail544880 - pyrdp.mitm.connections.ntlmssp - [!] NTLMSSP Hash: Administrator:::182451f1dc4554d3:e6142ff43bcf6e3234d92d07ef6ecefb:010100000000000069b6010000000000000000000000000000000000020014004b0041005500460041004e00570041004c00540001001800410052004200450049005400450052002d004e004300310004001a006b0061007500660061006e00770061006c0074002e006400650003003400610072006200650069007400650072002d006e00630031002e006b0061007500660061006e00770061006c0074002e006400650005001a006b0061007500660061006e00770061006c0074002e006400650007000800a0a06669359ddb0100000000
[2025-03-25 03:24:28,589] - INFO - Hollis201630 - pyrdp.mitm.connections.tcp - New client connected from red.act.ed:5793
[2025-03-25 03:24:28,589] - INFO - Ronald686928 - pyrdp.mitm.connections.cliprdr - Clipboard data: 'recent/pyrdp/\x00'
[2025-03-25 03:24:28,609] - INFO - Hollis201630 - pyrdp.mitm.connections.x224 - Cookie: mstshash=Administr
[2025-03-25 03:24:28,617] - INFO - Ronald899967 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert access denied')]
[2025-03-25 03:24:28,618] - INFO - Gail544880 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert access denied')]
[2025-03-25 03:24:28,630] - INFO - Hollis201630 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-31 01:54:28,837] - INFO - GLOBAL - pyrdp.mitm - Target: red.act.ed:3389
[2025-03-31 01:54:28,837] - INFO - GLOBAL - pyrdp.mitm - Output directory: /home/redacted/pyrdp/pyrdp_output
[2025-03-31 01:54:30,076] - DEBUG - GLOBAL - pyrdp - Initializing ServerTLSContext - Private key: pyrdp_output/certs/red.act.ed.pem, Certificate: pyrdp_output/certs/red.act.ed.crt
[2025-03-31 01:54:30,076] - DEBUG - GLOBAL - pyrdp - Creating DefaultOpenSSLContextFactory with SSLv23_METHOD
[2025-03-31 01:54:30,076] - DEBUG - GLOBAL - pyrdp - Creating TPDUSSLContext with method: 3
[2025-03-31 01:54:30,076] - DEBUG - GLOBAL - pyrdp - Setting standard TLS options
[2025-03-31 01:54:30,076] - DEBUG - GLOBAL - pyrdp - Disabling TLS 1.3
[2025-03-31 01:54:30,076] - DEBUG - GLOBAL - pyrdp - Could not get cipher list: 'TPDUSSLContext' object has no attribute 'get_cipher_list'
[2025-03-31 01:54:30,077] - DEBUG - GLOBAL - pyrdp - ServerTLSContext created successfully
[2025-03-31 01:54:30,077] - INFO - GLOBAL - pyrdp.mitm - Target: red.act.ed:3389
[2025-03-31 01:54:30,077] - INFO - GLOBAL - pyrdp.mitm - Output directory: /home/redacted/pyrdp/pyrdp_output
[2025-03-31 01:54:30,078] - INFO - GLOBAL - pyrdp - MITM Server listening on 0.0.0.0:3389
[2025-03-31 01:54:32,979] - DEBUG - Winona413528 - pyrdp.mitm.connections - Initializing RDPMITM with config: <pyrdp.mitm.config.MITMConfig object at 0x7fe42217f250>
[2025-03-31 01:54:32,980] - DEBUG - Winona413528 - pyrdp.mitm.connections - Authentication methods allowed: 0xb
[2025-03-31 01:54:32,980] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Initializing TCPMITM - Client: TwistedTCPLayer, Attacker: TwistedTCPLayer
[2025-03-31 01:54:32,980] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Client observer created
[2025-03-31 01:54:32,980] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Attacker observer created
[2025-03-31 01:54:32,980] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Setting server in TCPMITM - Server: TwistedTCPLayer
[2025-03-31 01:54:32,980] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Server observer created
[2025-03-31 01:54:32,980] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCPMITM initialization complete
[2025-03-31 01:54:32,981] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - X224MITM initialized
[2025-03-31 01:54:32,982] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP connection established
[2025-03-31 01:54:32,982] - INFO - Winona413528 - pyrdp.mitm.connections.tcp - New client connected from red.act.ed:32626
[2025-03-31 01:54:32,982] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Client connection details - IP: red.act.ed, Port: 32626, Transport: Server
[2025-03-31 01:54:32,982] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received - Length: 47
[2025-03-31 01:54:32,982] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received: 0300002f2ae00000000000436f6f6b69653a206d737473686173683d41646d696e697374720d0a010008000b000000
[2025-03-31 01:54:32,982] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - X224 Connection Request received - Credit: 0, Source: 0, Destination: 0, Options: 0, Payload length: 36
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - X224 Connection Request payload: 436f6f6b69653a206d737473686173683d41646d696e697374720d0a010008000b000000
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Client IP set to: red.act.ed
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Client requested protocols: 0xb
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Client requested protocol: SSL
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Client requested protocol: CRED_SSP (NLA)
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Client requested protocol: EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Client negotiation flags: 0x0
[2025-03-31 01:54:32,983] - INFO - Winona413528 - pyrdp.mitm.connections.x224 - Cookie: mstshash=Administr
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Connection cookie details: Cookie: mstshash=Administr
[2025-03-31 01:54:32,983] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Sending modified X224 Connection Request to server - Chosen protocols: 0xb
[2025-03-31 01:54:32,984] - DEBUG - Winona413528 - pyrdp.mitm.connections.client.x224 - Received X224ConnectionRequestPDU{'payload': b'Cookie: mstshash=Administr\r\n\x01\x00\x08\x00\x0b\x00\x00\x00', 'header': <X224PDUType.X224_TPDU_CONNECTION_REQUEST: 14>, 'credit': 0, 'destination': 0, 'source': 0, 'options': 0}
[2025-03-31 01:54:32,984] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Connecting to server...
[2025-03-31 01:54:32,984] - DEBUG - Winona413528 - pyrdp.mitm.connections - Adding client IP red.act.ed to loggers
[2025-03-31 01:54:32,984] - DEBUG - Winona413528 - pyrdp.mitm.connections - Connecting to target server: red.act.ed:3389
[2025-03-31 01:54:32,984] - DEBUG - Winona413528 - pyrdp.mitm.connections - Using direct connection to red.act.ed:3389
[2025-03-31 01:54:32,990] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP connection established
[2025-03-31 01:54:32,990] - INFO - Winona413528 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-31 01:54:32,991] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Server connection details - Transport: Client
[2025-03-31 01:54:32,991] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Server peer: IPv4Address(type='TCP', host='red.act.ed', port=3389)
[2025-03-31 01:54:32,991] - DEBUG - Winona413528 - pyrdp.mitm.connections - Connected to target server successfully
[2025-03-31 01:54:32,991] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Connected to server, sending X224 Connection Request
[2025-03-31 01:54:32,991] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 47
[2025-03-31 01:54:32,991] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent: 0300002f2ae00000000000436f6f6b69653a206d737473686173683d41646d696e697374720d0a010008000b000000
[2025-03-31 01:54:32,991] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:33,000] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received - Length: 19
[2025-03-31 01:54:33,000] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received: 030000130ed00000123400021f080008000000
[2025-03-31 01:54:33,000] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - X224 Connection Confirm received - Credit: 0, Source: 0, Destination: 4660, Options: 0, Payload length: 8
[2025-03-31 01:54:33,000] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - X224 Connection Confirm payload: 021f080008000000
[2025-03-31 01:54:33,000] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Negotiation Response PDU received - Type: 0x2, Selected protocols: 0x8
[2025-03-31 01:54:33,000] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Server selected protocol: EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:33,000] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - Client supports TLS, establishing TLS tunnel
[2025-03-31 01:54:33,000] - DEBUG - Winona413528 - pyrdp.mitm.connections - Starting TLS negotiation
[2025-03-31 01:54:33,001] - DEBUG - Winona413528 - pyrdp.mitm.connections - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:33,001] - DEBUG - Winona413528 - pyrdp.mitm.connections - Creating ClientTLSContext for server connection
[2025-03-31 01:54:33,001] - DEBUG - GLOBAL - pyrdp - Initializing ClientTLSContext
[2025-03-31 01:54:33,001] - DEBUG - Winona413528 - pyrdp.mitm.connections - Establishing TLS tunnel with server
[2025-03-31 01:54:33,001] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Starting TLS handshake with context: <pyrdp.core.ssl.ClientTLSContext object at 0x7fe42204a670>
[2025-03-31 01:54:33,001] - DEBUG - GLOBAL - pyrdp - Creating SSL context with SSLv23_METHOD (allows TLS 1.0, 1.1, 1.2)
[2025-03-31 01:54:33,001] - DEBUG - GLOBAL - pyrdp - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:33,001] - DEBUG - GLOBAL - pyrdp - Disabling TLS 1.3
[2025-03-31 01:54:33,001] - DEBUG - GLOBAL - pyrdp - Could not get cipher list: 'Context' object has no attribute 'get_cipher_list'
[2025-03-31 01:54:33,001] - DEBUG - GLOBAL - pyrdp - ClientTLSContext created successfully
[2025-03-31 01:54:33,002] - DEBUG - GLOBAL - pyrdp - Creating SSL context with SSLv23_METHOD (allows TLS 1.0, 1.1, 1.2)
[2025-03-31 01:54:33,002] - DEBUG - GLOBAL - pyrdp - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:33,002] - DEBUG - GLOBAL - pyrdp - Disabling TLS 1.3
[2025-03-31 01:54:33,002] - DEBUG - GLOBAL - pyrdp - Could not get cipher list: 'Context' object has no attribute 'get_cipher_list'
[2025-03-31 01:54:33,002] - DEBUG - GLOBAL - pyrdp - ClientTLSContext created successfully
[2025-03-31 01:54:33,003] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TLS handshake initiated
[2025-03-31 01:54:33,003] - DEBUG - Winona413528 - pyrdp.mitm.connections - Scheduling client TLS setup in 2 second(s)
[2025-03-31 01:54:33,003] - DEBUG - Winona413528 - pyrdp.mitm.connections.x224 - TLS state enabled
[2025-03-31 01:54:33,003] - DEBUG - Winona413528 - pyrdp.mitm.connections.server.x224 - Received X224ConnectionConfirmPDU{'payload': b'\x02\x1f\x08\x00\x08\x00\x00\x00', 'header': <X224PDUType.X224_TPDU_CONNECTION_CONFIRM: 13>, 'credit': 0, 'destination': 4660, 'source': 0, 'options': 0}
[2025-03-31 01:54:35,006] - DEBUG - Winona413528 - pyrdp.mitm.connections - Setting up TLS for client connection
[2025-03-31 01:54:35,006] - DEBUG - Winona413528 - pyrdp.mitm.connections - Server certificate received - Subject: <X509Name object '/CN=red.act.ed'>, Issuer: <X509Name object '/CN=red.act.ed'>
[2025-03-31 01:54:35,007] - DEBUG - Winona413528 - pyrdp.mitm.connections - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:35,007] - DEBUG - Winona413528 - pyrdp.mitm.connections - Server selected protocols: 0x8
[2025-03-31 01:54:35,007] - DEBUG - Winona413528 - pyrdp.mitm.connections - Server selected EARLY_USER_AUTHORIZATION_RESULT, using PassthroughNLAHandler
[2025-03-31 01:54:35,007] - DEBUG - Winona413528 - pyrdp.mitm.connections.ntlmssp - NLA Handler initialized [ID: 140617800003440] - ntlmCapture: False, challenge: None, sink type: TwistedTCPLayer
[2025-03-31 01:54:35,007] - DEBUG - Winona413528 - pyrdp.mitm.connections.ntlmssp - NLA Handler initialized [ID: 140617800130624] - ntlmCapture: False, challenge: None, sink type: TwistedTCPLayer
[2025-03-31 01:54:35,008] - DEBUG - Winona413528 - pyrdp.mitm.connections - Using specified certificate: pyrdp_output/certs/red.act.ed.crt, private key: pyrdp_output/certs/red.act.ed.pem
[2025-03-31 01:54:35,008] - DEBUG - GLOBAL - pyrdp - Initializing ServerTLSContext - Private key: pyrdp_output/certs/red.act.ed.pem, Certificate: pyrdp_output/certs/red.act.ed.crt
[2025-03-31 01:54:35,008] - DEBUG - GLOBAL - pyrdp - Creating DefaultOpenSSLContextFactory with SSLv23_METHOD
[2025-03-31 01:54:35,008] - DEBUG - GLOBAL - pyrdp - Creating TPDUSSLContext with method: 3
[2025-03-31 01:54:35,008] - DEBUG - GLOBAL - pyrdp - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:35,008] - DEBUG - GLOBAL - pyrdp - Disabling TLS 1.3
[2025-03-31 01:54:35,009] - DEBUG - GLOBAL - pyrdp - Could not get cipher list: 'TPDUSSLContext' object has no attribute 'get_cipher_list'
[2025-03-31 01:54:35,009] - DEBUG - GLOBAL - pyrdp - ServerTLSContext created successfully
[2025-03-31 01:54:35,009] - DEBUG - Winona413528 - pyrdp.mitm.connections - Establishing TLS tunnel with client
[2025-03-31 01:54:35,009] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 19
[2025-03-31 01:54:35,009] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent: 030000130ed000001234000200080008000000
[2025-03-31 01:54:35,009] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:35,010] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Starting TLS handshake with context: <pyrdp.core.ssl.ServerTLSContext object at 0x7fe42206a130>
[2025-03-31 01:54:35,010] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TLS handshake initiated
[2025-03-31 01:54:42,392] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Logging SSL parameters as required
[2025-03-31 01:54:42,392] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Logging SSL parameters for connection
[2025-03-31 01:54:42,392] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - SSL client_random: c6c633a0ed5319381b88676ca92cd9b84263c88f930cb8d3f535df6a48ad8435
[2025-03-31 01:54:42,393] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - SSL master_key: da727a0eac9825f9a28914d4ee4170b698e469351c1fd64c3fe8d9cff3a8e428049116db358cc46105eb3a6c8bc7d79e
[2025-03-31 01:54:42,393] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - SSL parameters logged successfully
[2025-03-31 01:54:42,393] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received - Length: 57
[2025-03-31 01:54:42,393] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received: 3037a003020106a130302e302ca02a04284e544c4d5353500001000000b78208e2000000000000000000000000000000000a005d580000000f
[2025-03-31 01:54:42,393] - DEBUG - Winona413528 - pyrdp.mitm.connections.ntlmssp - Passthrough NLA Handler [ID: 140617800003440] forwarding message #1 - Length: 57
[2025-03-31 01:54:42,393] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 57
[2025-03-31 01:54:42,394] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent: 3037a003020106a130302e302ca02a04284e544c4d5353500001000000b78208e2000000000000000000000000000000000a005d580000000f
[2025-03-31 01:54:42,394] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:42,394] - DEBUG - Winona413528 - pyrdp.mitm.connections.ntlmssp - Successfully forwarded NLA data
[2025-03-31 01:54:42,397] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Logging SSL parameters as required
[2025-03-31 01:54:42,397] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Logging SSL parameters for connection
[2025-03-31 01:54:42,397] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - SSL client_random: 63791f51e7894feebe6787782b3d5bd2b52532e7a2b1b689f3cbc369f80424b3
[2025-03-31 01:54:42,397] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - SSL master_key: f7f84c4bbc6787112980fcc7d03e04e70ad3d4a3ec0eb4b75746ef10d4133d85447cad5beebe3779e4bb4d17736aa96b
[2025-03-31 01:54:42,397] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - SSL parameters logged successfully
[2025-03-31 01:54:42,397] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received - Length: 305
[2025-03-31 01:54:42,397] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received (first 128 bytes): 3082012da003020106a1820124308201203082011ca0820118048201144e544c4d53535000020000001400140038000000358289e2deea152eae02df570000000000000000c800c8004c0000000a007c4f0000000f4b0041005500460041004e00570041004c005400020014004b0041005500460041004e00570041004c0054...
[2025-03-31 01:54:42,398] - DEBUG - Winona413528 - pyrdp.mitm.connections.ntlmssp - Passthrough NLA Handler [ID: 140617800130624] forwarding message #1 - Length: 305
[2025-03-31 01:54:42,398] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 305
[2025-03-31 01:54:42,398] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent (first 128 bytes): 3082012da003020106a1820124308201203082011ca0820118048201144e544c4d53535000020000001400140038000000358289e2deea152eae02df570000000000000000c800c8004c0000000a007c4f0000000f4b0041005500460041004e00570041004c005400020014004b0041005500460041004e00570041004c0054...
[2025-03-31 01:54:42,398] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:42,398] - DEBUG - Winona413528 - pyrdp.mitm.connections.ntlmssp - Successfully forwarded NLA data
[2025-03-31 01:54:42,512] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received - Length: 679
[2025-03-31 01:54:42,513] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data received (first 128 bytes): 308202a3a003020106a18202423082023e3082023aa0820236048202324e544c4d535350000300000018001800900000007a017a01a800000002000200580000001a001a005a0000001c001c00740000001000100022020000358288e20a005d580000000fec9ca60308ec2daaa987fd361ff8359d2e00410064006d0069006e...
[2025-03-31 01:54:42,513] - DEBUG - Winona413528 - pyrdp.mitm.connections.ntlmssp - Passthrough NLA Handler [ID: 140617800003440] forwarding message #2 - Length: 679
[2025-03-31 01:54:42,513] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 679
[2025-03-31 01:54:42,513] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent (first 128 bytes): 308202a3a003020106a18202423082023e3082023aa0820236048202324e544c4d535350000300000018001800900000007a017a01a800000002000200580000001a001a005a0000001c001c00740000001000100022020000358288e20a005d580000000fec9ca60308ec2daaa987fd361ff8359d2e00410064006d0069006e...
[2025-03-31 01:54:42,514] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:42,514] - DEBUG - Winona413528 - pyrdp.mitm.connections.ntlmssp - Successfully forwarded NLA data
[2025-03-31 01:54:43,521] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP connection lost - Reason: [Failure instance: Traceback: <class 'OpenSSL.SSL.Error'>: [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert internal error')]
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/asyncioreactor.py:138:_readOrWrite
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/tcp.py:248:doRead
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/tcp.py:253:_dataReceived
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/protocols/tls.py:329:dataReceived
--- <exception caught here> ---
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/protocols/tls.py:274:_flushReceiveBIO
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/SSL.py:1768:recv
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/SSL.py:1632:_raise_ssl_error
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/_util.py:57:exception_from_error_queue
]
[2025-03-31 01:54:43,521] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Server disconnection detected - Reason: [Failure instance: Traceback: <class 'OpenSSL.SSL.Error'>: [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert internal error')]
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/asyncioreactor.py:138:_readOrWrite
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/tcp.py:248:doRead
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/tcp.py:253:_dataReceived
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/protocols/tls.py:329:dataReceived
--- <exception caught here> ---
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/protocols/tls.py:274:_flushReceiveBIO
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/SSL.py:1768:recv
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/SSL.py:1632:_raise_ssl_error
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/_util.py:57:exception_from_error_queue
]
[2025-03-31 01:54:43,521] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Recording connection close
[2025-03-31 01:54:43,522] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Connection close recorded successfully
[2025-03-31 01:54:43,522] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Connection close recorded
[2025-03-31 01:54:43,522] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Recorder finalized
[2025-03-31 01:54:43,522] - INFO - Winona413528 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert internal error')]
[2025-03-31 01:54:43,522] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Disconnecting client
[2025-03-31 01:54:43,522] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Aborting TCP connection
[2025-03-31 01:54:43,523] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Client disconnected successfully
[2025-03-31 01:54:43,523] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Disconnecting attacker
[2025-03-31 01:54:43,523] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Attacker disconnected successfully
[2025-03-31 01:54:43,523] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Detaching TCPMITM observers
[2025-03-31 01:54:43,523] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Client observer removed
[2025-03-31 01:54:43,523] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - Server observer removed
[2025-03-31 01:54:43,524] - DEBUG - Winona413528 - pyrdp.mitm.connections.tcp - TCP connection lost - Reason: [Failure instance: Traceback (failure with no frames): <class 'twisted.internet.error.ConnectionLost'>: Connection to the other side was lost in a non-clean fashion: Connection lost.
]
[2025-03-31 01:54:44,570] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Initializing RDPMITM with config: <pyrdp.mitm.config.MITMConfig object at 0x7fe42217f250>
[2025-03-31 01:54:44,570] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Authentication methods allowed: 0xb
[2025-03-31 01:54:44,570] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Initializing TCPMITM - Client: TwistedTCPLayer, Attacker: TwistedTCPLayer
[2025-03-31 01:54:44,570] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Client observer created
[2025-03-31 01:54:44,571] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Attacker observer created
[2025-03-31 01:54:44,571] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Setting server in TCPMITM - Server: TwistedTCPLayer
[2025-03-31 01:54:44,571] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Server observer created
[2025-03-31 01:54:44,571] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCPMITM initialization complete
[2025-03-31 01:54:44,571] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - X224MITM initialized
[2025-03-31 01:54:44,572] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP connection established
[2025-03-31 01:54:44,572] - INFO - Fanny849068 - pyrdp.mitm.connections.tcp - New client connected from red.act.ed:44619
[2025-03-31 01:54:44,572] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Client connection details - IP: red.act.ed, Port: 44619, Transport: Server
[2025-03-31 01:54:44,572] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received - Length: 47
[2025-03-31 01:54:44,572] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received: 0300002f2ae00000000000436f6f6b69653a206d737473686173683d41646d696e697374720d0a010008000b000000
[2025-03-31 01:54:44,573] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - X224 Connection Request received - Credit: 0, Source: 0, Destination: 0, Options: 0, Payload length: 36
[2025-03-31 01:54:44,573] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - X224 Connection Request payload: 436f6f6b69653a206d737473686173683d41646d696e697374720d0a010008000b000000
[2025-03-31 01:54:44,573] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Client IP set to: red.act.ed
[2025-03-31 01:54:44,573] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Client requested protocols: 0xb
[2025-03-31 01:54:44,573] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Client requested protocol: SSL
[2025-03-31 01:54:44,573] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Client requested protocol: CRED_SSP (NLA)
[2025-03-31 01:54:44,573] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Client requested protocol: EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:44,573] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Client negotiation flags: 0x0
[2025-03-31 01:54:44,574] - INFO - Fanny849068 - pyrdp.mitm.connections.x224 - Cookie: mstshash=Administr
[2025-03-31 01:54:44,574] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Connection cookie details: Cookie: mstshash=Administr
[2025-03-31 01:54:44,574] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Sending modified X224 Connection Request to server - Chosen protocols: 0xb
[2025-03-31 01:54:44,574] - DEBUG - Fanny849068 - pyrdp.mitm.connections.client.x224 - Received X224ConnectionRequestPDU{'payload': b'Cookie: mstshash=Administr\r\n\x01\x00\x08\x00\x0b\x00\x00\x00', 'header': <X224PDUType.X224_TPDU_CONNECTION_REQUEST: 14>, 'credit': 0, 'destination': 0, 'source': 0, 'options': 0}
[2025-03-31 01:54:44,574] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Connecting to server...
[2025-03-31 01:54:44,574] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Adding client IP red.act.ed to loggers
[2025-03-31 01:54:44,574] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Connecting to target server: red.act.ed:3389
[2025-03-31 01:54:44,575] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Using direct connection to red.act.ed:3389
[2025-03-31 01:54:44,585] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP connection established
[2025-03-31 01:54:44,586] - INFO - Fanny849068 - pyrdp.mitm.connections.tcp - Server connected
[2025-03-31 01:54:44,586] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Server connection details - Transport: Client
[2025-03-31 01:54:44,586] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Server peer: IPv4Address(type='TCP', host='red.act.ed', port=3389)
[2025-03-31 01:54:44,586] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Connected to target server successfully
[2025-03-31 01:54:44,586] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Connected to server, sending X224 Connection Request
[2025-03-31 01:54:44,586] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 47
[2025-03-31 01:54:44,586] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent: 0300002f2ae00000000000436f6f6b69653a206d737473686173683d41646d696e697374720d0a010008000b000000
[2025-03-31 01:54:44,587] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:44,594] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received - Length: 19
[2025-03-31 01:54:44,594] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received: 030000130ed00000123400021f080008000000
[2025-03-31 01:54:44,594] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - X224 Connection Confirm received - Credit: 0, Source: 0, Destination: 4660, Options: 0, Payload length: 8
[2025-03-31 01:54:44,594] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - X224 Connection Confirm payload: 021f080008000000
[2025-03-31 01:54:44,594] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Negotiation Response PDU received - Type: 0x2, Selected protocols: 0x8
[2025-03-31 01:54:44,594] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Server selected protocol: EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:44,595] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - Client supports TLS, establishing TLS tunnel
[2025-03-31 01:54:44,595] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Starting TLS negotiation
[2025-03-31 01:54:44,595] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:44,595] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Creating ClientTLSContext for server connection
[2025-03-31 01:54:44,595] - DEBUG - GLOBAL - pyrdp - Initializing ClientTLSContext
[2025-03-31 01:54:44,595] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Establishing TLS tunnel with server
[2025-03-31 01:54:44,595] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Starting TLS handshake with context: <pyrdp.core.ssl.ClientTLSContext object at 0x7fe4220080d0>
[2025-03-31 01:54:44,595] - DEBUG - GLOBAL - pyrdp - Creating SSL context with SSLv23_METHOD (allows TLS 1.0, 1.1, 1.2)
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - Disabling TLS 1.3
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - Could not get cipher list: 'Context' object has no attribute 'get_cipher_list'
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - ClientTLSContext created successfully
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - Creating SSL context with SSLv23_METHOD (allows TLS 1.0, 1.1, 1.2)
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - Disabling TLS 1.3
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - Could not get cipher list: 'Context' object has no attribute 'get_cipher_list'
[2025-03-31 01:54:44,596] - DEBUG - GLOBAL - pyrdp - ClientTLSContext created successfully
[2025-03-31 01:54:44,597] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TLS handshake initiated
[2025-03-31 01:54:44,597] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Scheduling client TLS setup in 2 second(s)
[2025-03-31 01:54:44,597] - DEBUG - Fanny849068 - pyrdp.mitm.connections.x224 - TLS state enabled
[2025-03-31 01:54:44,598] - DEBUG - Fanny849068 - pyrdp.mitm.connections.server.x224 - Received X224ConnectionConfirmPDU{'payload': b'\x02\x1f\x08\x00\x08\x00\x00\x00', 'header': <X224PDUType.X224_TPDU_CONNECTION_CONFIRM: 13>, 'credit': 0, 'destination': 4660, 'source': 0, 'options': 0}
[2025-03-31 01:54:46,600] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Setting up TLS for client connection
[2025-03-31 01:54:46,600] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Server certificate received - Subject: <X509Name object '/CN=red.act.ed'>, Issuer: <X509Name object '/CN=red.act.ed'>
[2025-03-31 01:54:46,600] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:46,600] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Server selected protocols: 0x8
[2025-03-31 01:54:46,601] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Server selected EARLY_USER_AUTHORIZATION_RESULT, using PassthroughNLAHandler
[2025-03-31 01:54:46,601] - DEBUG - Fanny849068 - pyrdp.mitm.connections.ntlmssp - NLA Handler initialized [ID: 140617799730896] - ntlmCapture: False, challenge: None, sink type: TwistedTCPLayer
[2025-03-31 01:54:46,601] - DEBUG - Fanny849068 - pyrdp.mitm.connections.ntlmssp - NLA Handler initialized [ID: 140617799731280] - ntlmCapture: False, challenge: None, sink type: TwistedTCPLayer
[2025-03-31 01:54:46,601] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Using specified certificate: pyrdp_output/certs/red.act.ed.crt, private key: pyrdp_output/certs/red.act.ed.pem
[2025-03-31 01:54:46,601] - DEBUG - GLOBAL - pyrdp - Initializing ServerTLSContext - Private key: pyrdp_output/certs/red.act.ed.pem, Certificate: pyrdp_output/certs/red.act.ed.crt
[2025-03-31 01:54:46,601] - DEBUG - GLOBAL - pyrdp - Creating DefaultOpenSSLContextFactory with SSLv23_METHOD
[2025-03-31 01:54:46,601] - DEBUG - GLOBAL - pyrdp - Creating TPDUSSLContext with method: 3
[2025-03-31 01:54:46,602] - DEBUG - GLOBAL - pyrdp - Using permissive TLS options for EARLY_USER_AUTHORIZATION_RESULT
[2025-03-31 01:54:46,602] - DEBUG - GLOBAL - pyrdp - Disabling TLS 1.3
[2025-03-31 01:54:46,602] - DEBUG - GLOBAL - pyrdp - Could not get cipher list: 'TPDUSSLContext' object has no attribute 'get_cipher_list'
[2025-03-31 01:54:46,602] - DEBUG - GLOBAL - pyrdp - ServerTLSContext created successfully
[2025-03-31 01:54:46,602] - DEBUG - Fanny849068 - pyrdp.mitm.connections - Establishing TLS tunnel with client
[2025-03-31 01:54:46,602] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 19
[2025-03-31 01:54:46,604] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent: 030000130ed000001234000200080008000000
[2025-03-31 01:54:46,604] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:46,604] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Starting TLS handshake with context: <pyrdp.core.ssl.ServerTLSContext object at 0x7fe4220084f0>
[2025-03-31 01:54:46,605] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TLS handshake initiated
[2025-03-31 01:54:46,954] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Logging SSL parameters as required
[2025-03-31 01:54:46,954] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Logging SSL parameters for connection
[2025-03-31 01:54:46,954] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - SSL client_random: 67e9f5e2a12f7ea6694aaea015444adca16781ef61955117573df0cdbdfb6cf9
[2025-03-31 01:54:46,954] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - SSL master_key: cebc85dd5a6637ce62b73c6c6be08143187ae36bb7fcfdd8212f852da5dc0112aa8b8872b9f814ea895761b25e059e62
[2025-03-31 01:54:46,955] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - SSL parameters logged successfully
[2025-03-31 01:54:46,955] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received - Length: 57
[2025-03-31 01:54:46,955] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received: 3037a003020106a130302e302ca02a04284e544c4d5353500001000000b78208e2000000000000000000000000000000000a005d580000000f
[2025-03-31 01:54:46,955] - DEBUG - Fanny849068 - pyrdp.mitm.connections.ntlmssp - Passthrough NLA Handler [ID: 140617799730896] forwarding message #1 - Length: 57
[2025-03-31 01:54:46,955] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 57
[2025-03-31 01:54:46,955] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent: 3037a003020106a130302e302ca02a04284e544c4d5353500001000000b78208e2000000000000000000000000000000000a005d580000000f
[2025-03-31 01:54:46,956] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:46,956] - DEBUG - Fanny849068 - pyrdp.mitm.connections.ntlmssp - Successfully forwarded NLA data
[2025-03-31 01:54:46,959] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Logging SSL parameters as required
[2025-03-31 01:54:46,959] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Logging SSL parameters for connection
[2025-03-31 01:54:46,959] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - SSL client_random: b87202cd46dbd9081678594f569f042157f5f50a26bf2140d462e2da720f2681
[2025-03-31 01:54:46,959] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - SSL master_key: afeaaeb52d8fb1e1a841f9b4da585df86aa12a2ecc897e9232b16df568f0bd4e144f1cc342a1398a0abf9e50102b733e
[2025-03-31 01:54:46,959] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - SSL parameters logged successfully
[2025-03-31 01:54:46,960] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received - Length: 305
[2025-03-31 01:54:46,960] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received (first 128 bytes): 3082012da003020106a1820124308201203082011ca0820118048201144e544c4d53535000020000001400140038000000358289e22a3233c80268c7d30000000000000000c800c8004c0000000a007c4f0000000f4b0041005500460041004e00570041004c005400020014004b0041005500460041004e00570041004c0054...
[2025-03-31 01:54:46,960] - DEBUG - Fanny849068 - pyrdp.mitm.connections.ntlmssp - Passthrough NLA Handler [ID: 140617799731280] forwarding message #1 - Length: 305
[2025-03-31 01:54:46,960] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 305
[2025-03-31 01:54:46,960] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent (first 128 bytes): 3082012da003020106a1820124308201203082011ca0820118048201144e544c4d53535000020000001400140038000000358289e22a3233c80268c7d30000000000000000c800c8004c0000000a007c4f0000000f4b0041005500460041004e00570041004c005400020014004b0041005500460041004e00570041004c0054...
[2025-03-31 01:54:46,960] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:46,961] - DEBUG - Fanny849068 - pyrdp.mitm.connections.ntlmssp - Successfully forwarded NLA data
[2025-03-31 01:54:47,077] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received - Length: 679
[2025-03-31 01:54:47,077] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data received (first 128 bytes): 308202a3a003020106a18202423082023e3082023aa0820236048202324e544c4d535350000300000018001800900000007a017a01a800000002000200580000001a001a005a0000001c001c00740000001000100022020000358288e20a005d580000000f4cfd46c1a716bde2aa74c4a427395e1c2e00410064006d0069006e...
[2025-03-31 01:54:47,077] - DEBUG - Fanny849068 - pyrdp.mitm.connections.ntlmssp - Passthrough NLA Handler [ID: 140617799730896] forwarding message #2 - Length: 679
[2025-03-31 01:54:47,078] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Sending TCP data - Length: 679
[2025-03-31 01:54:47,078] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent (first 128 bytes): 308202a3a003020106a18202423082023e3082023aa0820236048202324e544c4d535350000300000018001800900000007a017a01a800000002000200580000001a001a005a0000001c001c00740000001000100022020000358288e20a005d580000000f4cfd46c1a716bde2aa74c4a427395e1c2e00410064006d0069006e...
[2025-03-31 01:54:47,078] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP data sent successfully
[2025-03-31 01:54:47,078] - DEBUG - Fanny849068 - pyrdp.mitm.connections.ntlmssp - Successfully forwarded NLA data
[2025-03-31 01:54:48,084] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP connection lost - Reason: [Failure instance: Traceback: <class 'OpenSSL.SSL.Error'>: [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert internal error')]
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/asyncioreactor.py:138:_readOrWrite
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/tcp.py:248:doRead
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/tcp.py:253:_dataReceived
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/protocols/tls.py:329:dataReceived
--- <exception caught here> ---
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/protocols/tls.py:274:_flushReceiveBIO
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/SSL.py:1768:recv
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/SSL.py:1632:_raise_ssl_error
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/_util.py:57:exception_from_error_queue
]
[2025-03-31 01:54:48,084] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Server disconnection detected - Reason: [Failure instance: Traceback: <class 'OpenSSL.SSL.Error'>: [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert internal error')]
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/asyncioreactor.py:138:_readOrWrite
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/tcp.py:248:doRead
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/internet/tcp.py:253:_dataReceived
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/protocols/tls.py:329:dataReceived
--- <exception caught here> ---
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/twisted/protocols/tls.py:274:_flushReceiveBIO
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/SSL.py:1768:recv
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/SSL.py:1632:_raise_ssl_error
/home/redacted/pyrdp/venv/lib/python3.8/site-packages/OpenSSL/_util.py:57:exception_from_error_queue
]
[2025-03-31 01:54:48,085] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Recording connection close
[2025-03-31 01:54:48,085] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Connection close recorded successfully
[2025-03-31 01:54:48,085] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Connection close recorded
[2025-03-31 01:54:48,085] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Recorder finalized
[2025-03-31 01:54:48,085] - INFO - Fanny849068 - pyrdp.mitm.connections.tcp - Server connection closed. [('SSL routines', 'ssl3_read_bytes', 'tlsv1 alert internal error')]
[2025-03-31 01:54:48,085] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Disconnecting client
[2025-03-31 01:54:48,085] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Aborting TCP connection
[2025-03-31 01:54:48,086] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Client disconnected successfully
[2025-03-31 01:54:48,086] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Disconnecting attacker
[2025-03-31 01:54:48,086] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Attacker disconnected successfully
[2025-03-31 01:54:48,086] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Detaching TCPMITM observers
[2025-03-31 01:54:48,086] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Client observer removed
[2025-03-31 01:54:48,086] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - Server observer removed
[2025-03-31 01:54:48,087] - DEBUG - Fanny849068 - pyrdp.mitm.connections.tcp - TCP connection lost - Reason: [Failure instance: Traceback (failure with no frames): <class 'twisted.internet.error.ConnectionLost'>: Connection to the other side was lost in a non-clean fashion: Connection lost.
]

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions