Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
samba /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
blackbox
[ DIR ]
drwxr-xr-x
dcerpc
[ DIR ]
drwxr-xr-x
dns_forwarder_helpers
[ DIR ]
drwxr-xr-x
emulate
[ DIR ]
drwxr-xr-x
kcc
[ DIR ]
drwxr-xr-x
krb5
[ DIR ]
drwxr-xr-x
samba_tool
[ DIR ]
drwxr-xr-x
__init__.py
22.9
KB
-rw-r--r--
audit_log_base.py
6.98
KB
-rw-r--r--
audit_log_dsdb.py
24.46
KB
-rw-r--r--
audit_log_pass_change.py
12.86
KB
-rw-r--r--
auth.py
4.5
KB
-rw-r--r--
auth_log.py
65.62
KB
-rw-r--r--
auth_log_base.py
5.42
KB
-rw-r--r--
auth_log_ncalrpc.py
4.19
KB
-rw-r--r--
auth_log_netlogon.py
5.22
KB
-rw-r--r--
auth_log_netlogon_bad_creds.py
7.7
KB
-rw-r--r--
auth_log_pass_change.py
12.92
KB
-rw-r--r--
auth_log_samlogon.py
6.68
KB
-rw-r--r--
auth_log_winbind.py
19.13
KB
-rw-r--r--
common.py
3.06
KB
-rw-r--r--
complex_expressions.py
18.37
KB
-rw-r--r--
core.py
2.77
KB
-rw-r--r--
cred_opt.py
1.73
KB
-rw-r--r--
credentials.py
22.13
KB
-rw-r--r--
dckeytab.py
2.11
KB
-rw-r--r--
dns.py
84.34
KB
-rw-r--r--
dns_aging.py
108.76
KB
-rw-r--r--
dns_base.py
14.3
KB
-rw-r--r--
dns_forwarder.py
20.95
KB
-rw-r--r--
dns_invalid.py
2.66
KB
-rw-r--r--
dns_packet.py
7.13
KB
-rw-r--r--
dns_tkey.py
7.11
KB
-rw-r--r--
dns_wildcard.py
12.89
KB
-rw-r--r--
docs.py
18.25
KB
-rw-r--r--
domain_backup.py
26.76
KB
-rw-r--r--
domain_backup_offline.py
10.01
KB
-rw-r--r--
dsdb.py
41.91
KB
-rw-r--r--
dsdb_api.py
1.93
KB
-rw-r--r--
dsdb_dns.py
2.56
KB
-rw-r--r--
dsdb_lock.py
11.63
KB
-rw-r--r--
dsdb_schema_attributes.py
8.9
KB
-rw-r--r--
encrypted_secrets.py
3.02
KB
-rw-r--r--
gensec.py
8.91
KB
-rw-r--r--
get_opt.py
2.47
KB
-rw-r--r--
getdcname.py
18.52
KB
-rw-r--r--
glue.py
3.75
KB
-rw-r--r--
gpo.py
80.28
KB
-rw-r--r--
gpo_member.py
1.69
KB
-rw-r--r--
graph.py
26.45
KB
-rw-r--r--
group_audit.py
16.52
KB
-rw-r--r--
hostconfig.py
2.14
KB
-rw-r--r--
imports.py
1.12
KB
-rw-r--r--
join.py
6.71
KB
-rw-r--r--
krb5_credentials.py
3.8
KB
-rw-r--r--
ldap_raw.py
31.92
KB
-rw-r--r--
ldap_referrals.py
3.13
KB
-rw-r--r--
ldap_spn.py
34.19
KB
-rw-r--r--
ldap_upn_sam_account.py
17.63
KB
-rw-r--r--
libsmb.py
4.26
KB
-rw-r--r--
loadparm.py
3.25
KB
-rw-r--r--
lsa_string.py
2.22
KB
-rw-r--r--
messaging.py
4.97
KB
-rw-r--r--
ndr.py
4.09
KB
-rw-r--r--
net_join.py
2.29
KB
-rw-r--r--
net_join_no_spnego.py
3.46
KB
-rw-r--r--
netbios.py
2.08
KB
-rw-r--r--
netcmd.py
5.32
KB
-rw-r--r--
netlogonsvc.py
2.43
KB
-rw-r--r--
ntacls.py
3.68
KB
-rw-r--r--
ntacls_backup.py
6.58
KB
-rw-r--r--
ntlm_auth.py
13.08
KB
-rw-r--r--
ntlm_auth_base.py
8.5
KB
-rw-r--r--
ntlm_auth_krb5.py
3.63
KB
-rw-r--r--
ntlmdisabled.py
3.01
KB
-rw-r--r--
pam_winbind.py
2.52
KB
-rw-r--r--
pam_winbind_chauthtok.py
1.56
KB
-rw-r--r--
pam_winbind_warn_pwd_expire.py
2.01
KB
-rw-r--r--
param.py
3.58
KB
-rw-r--r--
password_hash.py
12.43
KB
-rw-r--r--
password_hash_fl2003.py
7.34
KB
-rw-r--r--
password_hash_fl2008.py
7.89
KB
-rw-r--r--
password_hash_gpgme.py
11.88
KB
-rw-r--r--
password_hash_ldap.py
4.85
KB
-rw-r--r--
password_quality.py
2.15
KB
-rw-r--r--
password_test.py
1.94
KB
-rw-r--r--
policy.py
1.17
KB
-rw-r--r--
posixacl.py
38.89
KB
-rw-r--r--
prefork_restart.py
16
KB
-rw-r--r--
process_limits.py
2.95
KB
-rw-r--r--
provision.py
6.35
KB
-rw-r--r--
pso.py
11.23
KB
-rw-r--r--
py_credentials.py
14.82
KB
-rw-r--r--
registry.py
2.5
KB
-rw-r--r--
s3_net_join.py
2.63
KB
-rw-r--r--
s3idmapdb.py
1.95
KB
-rw-r--r--
s3param.py
1.75
KB
-rw-r--r--
s3passdb.py
5.66
KB
-rw-r--r--
s3registry.py
1.82
KB
-rw-r--r--
s3windb.py
1.48
KB
-rw-r--r--
samba3sam.py
48.45
KB
-rw-r--r--
samba_upgradedns_lmdb.py
2.56
KB
-rw-r--r--
samdb.py
2.51
KB
-rw-r--r--
samdb_api.py
5.41
KB
-rw-r--r--
sddl.py
8.86
KB
-rw-r--r--
security.py
6.25
KB
-rw-r--r--
segfault.py
7
KB
-rw-r--r--
smb-notify.py
18.85
KB
-rw-r--r--
smb.py
9.47
KB
-rw-r--r--
smbd_base.py
1.76
KB
-rw-r--r--
smbd_fuzztest.py
3.5
KB
-rw-r--r--
source.py
8.74
KB
-rw-r--r--
strings.py
3.89
KB
-rw-r--r--
subunitrun.py
2.33
KB
-rw-r--r--
tdb_util.py
1.76
KB
-rw-r--r--
upgrade.py
1.36
KB
-rw-r--r--
upgradeprovision.py
6.65
KB
-rw-r--r--
upgradeprovisionneeddc.py
7.49
KB
-rw-r--r--
usage.py
12.98
KB
-rw-r--r--
xattr.py
5.27
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ntlm_auth.py
# Unix SMB/CIFS implementation. # # Copyright (C) Samuel Cabrero <scabrero@suse.de> 2018 # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # import os from subprocess import Popen, PIPE from samba.tests.ntlm_auth_base import NTLMAuthTestCase from samba.common import get_string class NTLMAuthHelpersTests(NTLMAuthTestCase): def setUp(self): super(NTLMAuthHelpersTests, self).setUp() self.username = os.environ["DC_USERNAME"] self.password = os.environ["DC_PASSWORD"] self.domain = os.environ["DOMAIN"] out = get_string(self.check_output("wbinfo -n %s" % self.username)) self.group_sid = out.split(" ")[0] self.assertTrue(self.group_sid.startswith("S-1-5-21-")) self.bad_group_sid = self.group_sid[:-2] def test_specified_domain(self): """ ntlm_auth with specified domain """ username = "foo" password = "secret" domain = "FOO" ret = self.run_helper(client_username=username, client_password=password, client_domain=domain, server_username=username, server_password=password, server_domain=domain, server_use_winbind=False) self.assertTrue(ret) username = "foo" password = "secret" domain = "fOo" ret = self.run_helper(client_username=username, client_password=password, client_domain=domain, server_username=username, server_password=password, server_domain=domain, server_use_winbind=False) self.assertTrue(ret) def test_against_winbind(self): """ ntlm_auth against winbindd """ ret = self.run_helper(client_username=self.username, client_password=self.password, client_domain=self.domain, server_use_winbind=True) self.assertTrue(ret) def test_ntlmssp_gss_spnego(self): """ ntlm_auth with NTLMSSP client and gss-spnego server """ username = "foo" password = "secret" domain = "fOo" ret = self.run_helper(client_username=username, client_password=password, client_domain=domain, server_username=username, server_password=password, server_domain=domain, client_helper="ntlmssp-client-1", server_helper="gss-spnego", server_use_winbind=False) self.assertTrue(ret) def test_gss_spnego(self): """ ntlm_auth with NTLMSSP gss-spnego-client and gss-spnego server """ username = "foo" password = "secret" domain = "fOo" ret = self.run_helper(client_username=username, client_password=password, client_domain=domain, server_username=username, server_password=password, server_domain=domain, client_helper="gss-spnego-client", server_helper="gss-spnego", server_use_winbind=False) self.assertTrue(ret) def test_gss_spnego_winbind(self): """ ntlm_auth with NTLMSSP gss-spnego-client and gss-spnego server against winbind """ ret = self.run_helper(client_username=self.username, client_password=self.password, client_domain=self.domain, client_helper="gss-spnego-client", server_helper="gss-spnego", server_use_winbind=True) self.assertTrue(ret) def test_ntlmssp_gss_spnego_cached_creds(self): """ ntlm_auth with NTLMSSP client and gss-spnego server against winbind with cached credentials """ param = "--ccache-save=%s%s%s%%%s" % (self.domain, self.winbind_separator, self.username, self.password) cache_cmd = ["wbinfo", param] self.check_exit_code(cache_cmd, 0) ret = self.run_helper(client_username=self.username, client_password=self.password, client_domain=self.domain, client_use_cached_creds=True, client_helper="ntlmssp-client-1", server_helper="gss-spnego", server_use_winbind=True) self.assertTrue(ret) def test_require_membership(self): """ ntlm_auth against winbindd with require-membership-of """ ret = self.run_helper(client_username=self.username, client_password=self.password, client_domain=self.domain, require_membership=self.group_sid, server_use_winbind=True) self.assertTrue(ret) ret = self.run_helper(client_username=self.username, client_password=self.password, client_domain=self.domain, require_membership=self.bad_group_sid, server_use_winbind=True) self.assertFalse(ret) def test_require_membership_gss_spnego(self): """ ntlm_auth with NTLMSSP gss-spnego-client and gss-spnego server against winbind with require-membership-of """ ret = self.run_helper(client_username=self.username, client_password=self.password, client_domain=self.domain, require_membership=self.group_sid, client_helper="gss-spnego-client", server_helper="gss-spnego", server_use_winbind=True) self.assertTrue(ret) ret = self.run_helper(client_username=self.username, client_password=self.password, client_domain=self.domain, require_membership=self.bad_group_sid, client_helper="gss-spnego-client", server_helper="gss-spnego", server_use_winbind=True) self.assertFalse(ret) def test_plaintext_with_membership(self): """ ntlm_auth plaintext authentication with require-membership-of """ proc = Popen([self.ntlm_auth_path, "--require-membership-of", self.group_sid, "--helper-protocol", "squid-2.5-basic"], stdout=PIPE, stdin=PIPE, stderr=PIPE) creds = "%s%s%s %s\n" % (self.domain, self.winbind_separator, self.username, self.password) (out, err) = proc.communicate(input=creds.encode('utf-8')) self.assertEqual(proc.returncode, 0) self.assertTrue(out.startswith(b"OK\n")) # Check membership failure proc = Popen([self.ntlm_auth_path, "--require-membership-of", self.bad_group_sid, "--helper-protocol", "squid-2.5-basic"], stdout=PIPE, stdin=PIPE, stderr=PIPE) creds = "%s%s%s %s\n" % (self.domain, self.winbind_separator, self.username, self.password) (out, err) = proc.communicate(input=creds.encode('utf-8')) self.assertEqual(proc.returncode, 0) self.assertTrue(out.startswith(b"ERR\n")) def test_ntlm_server_1_with_fixed_password(self): """ ntlm_auth ntlm-server-1 with fixed password """ ntlm_cmds = [ "LANMAN-Challenge: 0123456789abcdef", "NT-Response: 25a98c1c31e81847466b29b2df4680f39958fb8c213a9cc6", "NT-Domain: TEST", "Username: testuser", "Request-User-Session-Key: Yes", ".\n" ] proc = Popen([self.ntlm_auth_path, "--password", "SecREt01", "--helper-protocol", "ntlm-server-1"], stdout=PIPE, stdin=PIPE, stderr=PIPE) buf = "\n".join(ntlm_cmds) (out, err) = proc.communicate(input=buf.encode('utf-8')) self.assertEqual(proc.returncode, 0) lines = out.split(b"\n") self.assertEqual(len(lines), 4) self.assertEqual(lines[0], b"Authenticated: Yes") self.assertEqual( lines[1], b"User-Session-Key: 3F373EA8E4AF954F14FAA506F8EEBDC4") self.assertEqual(lines[2], b".") self.assertEqual(lines[3], b"") # Break the password with a leading A on the challenge ntlm_cmds[0] = "LANMAN-Challenge: A123456789abcdef" proc = Popen([self.ntlm_auth_path, "--password", "SecREt01", "--helper-protocol", "ntlm-server-1"], stdout=PIPE, stdin=PIPE, stderr=PIPE) buf = "\n".join(ntlm_cmds) (out, err) = proc.communicate(input=buf.encode('utf-8')) self.assertEqual(proc.returncode, 0) lines = out.split(b"\n") self.assertEqual(len(lines), 5) self.assertEqual(lines[0], b"Authenticated: No") def test_ntlm_server_1_with_plaintext_winbind(self): """ ntlm_auth ntlm-server-1 with plaintext password against winbind """ ntlm_cmds = [ "Password: %s" % self.password, "NT-Domain: %s" % self.domain, "Username: %s" % self.username, "Request-User-Session-Key: Yes", ".\n" ] proc = Popen([self.ntlm_auth_path, "--require-membership-of", self.group_sid, "--helper-protocol", "ntlm-server-1"], stdout=PIPE, stdin=PIPE, stderr=PIPE) buf = "\n".join(ntlm_cmds) (out, err) = proc.communicate(input=buf.encode('utf-8')) self.assertEqual(proc.returncode, 0) lines = out.split(b"\n") self.assertEqual(len(lines), 3) self.assertEqual(lines[0], b"Authenticated: Yes") self.assertEqual(lines[1], b".") self.assertEqual(lines[2], b"") # Check membership failure proc = Popen([self.ntlm_auth_path, "--require-membership-of", self.bad_group_sid, "--helper-protocol", "ntlm-server-1"], stdout=PIPE, stdin=PIPE, stderr=PIPE) buf = "\n".join(ntlm_cmds) (out, err) = proc.communicate(input=buf.encode('utf-8')) self.assertEqual(proc.returncode, 0) lines = out.split(b"\n") self.assertEqual(len(lines), 3) self.assertEqual(lines[0], b"Authenticated: No") self.assertEqual(lines[1], b".") self.assertEqual(lines[2], b"") def test_ntlm_server_1_with_incorrect_password_winbind(self): """ ntlm_auth ntlm-server-1 with incorrect fixed password against winbind """ ntlm_cmds = [ "LANMAN-Challenge: 0123456789abcdef", "NT-Response: 25a98c1c31e81847466b29b2df4680f39958fb8c213a9cc6", "NT-Domain: %s" % self.domain, "Username: %s" % self.username, "Request-User-Session-Key: Yes", ".\n" ] proc = Popen([self.ntlm_auth_path, "--helper-protocol", "ntlm-server-1"], stdout=PIPE, stdin=PIPE, stderr=PIPE) buf = "\n".join(ntlm_cmds) (out, err) = proc.communicate(input=buf.encode('utf-8')) self.assertEqual(proc.returncode, 0) lines = out.split(b"\n") self.assertEqual(len(lines), 5) self.assertEqual(lines[0], b"Authenticated: No") def test_diagnostics(self): """ ntlm_auth diagnostics """ cmd_line = [self.ntlm_auth_path, "--username", self.username, "--password", self.password, "--domain", self.domain, "--diagnostics"] self.check_exit_code(cmd_line, 0)
Close