Nmap Development mailing list archives

One important moment in Ncrack code


From: not () null net
Date: Thu, 07 Oct 2010 03:09:32 -0400

For the proper and timely receipt of the result of a false authentication need to change the piece of code in ncrack_rdp.cc procedures rdp_parse_text2 (...)

 if (!memcmp(text, LOGON_AUTH_FAILED, 3)) {
   info->login_result = LOGIN_FAIL;
   if (o.debugging > 8)
     fprintf(stderr, "Retrieved connection termination packet.\n");
 }

 if ((!memcmp(text, LOGON_MESSAGE_FAILED_XP, 18))
     || (!memcmp(text, LOGON_MESSAGE_FAILED_2K3, 18))) {
   info->login_result = LOGIN_ERROR;

otherwise Ncrack gets the wrong result, or do not get it

with best regards,
ROleg

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: