From 6dcae18a99ba7f7ca44c246d0e72b4d9410eb60c Mon Sep 17 00:00:00 2001 From: Bryan McNulty Date: Sat, 1 Mar 2025 20:50:04 -0600 Subject: Added tsch module --- pkg/exec/scmr/exec.go | 140 +++++++++++++++++++++++++------------------------- 1 file changed, 71 insertions(+), 69 deletions(-) (limited to 'pkg/exec/scmr/exec.go') diff --git a/pkg/exec/scmr/exec.go b/pkg/exec/scmr/exec.go index b3c1531..c2702a3 100644 --- a/pkg/exec/scmr/exec.go +++ b/pkg/exec/scmr/exec.go @@ -4,11 +4,11 @@ import ( "context" "errors" "fmt" - "github.com/bryanmcnulty/adauth" - "github.com/rs/zerolog" "github.com/FalconOpsLLC/goexec/pkg/client/dcerpc" "github.com/FalconOpsLLC/goexec/pkg/exec" "github.com/FalconOpsLLC/goexec/pkg/windows" + "github.com/bryanmcnulty/adauth" + "github.com/rs/zerolog" ) const ( @@ -20,94 +20,94 @@ const ( ServiceAllAccess uint32 = ServiceCreateAccess | ServiceModifyAccess ) -func (executor *Executor) createClients(ctx context.Context) (cleanup func(cCtx context.Context), err error) { +func (mod *Module) createClients(ctx context.Context) (cleanup func(cCtx context.Context), err error) { cleanup = func(context.Context) { - if executor.dce != nil { - executor.log.Debug().Msg("Cleaning up clients") - if err := executor.dce.Close(ctx); err != nil { - executor.log.Error().Err(err).Msg("Failed to destroy DCE connection") + if mod.dce != nil { + mod.log.Debug().Msg("Cleaning up clients") + if err := mod.dce.Close(ctx); err != nil { + mod.log.Error().Err(err).Msg("Failed to destroy DCE connection") } } } cleanup(ctx) - executor.dce = dcerpc.NewDCEClient(ctx, false, &dcerpc.SmbConfig{Port: 445}) + mod.dce = dcerpc.NewDCEClient(ctx, false, &dcerpc.SmbConfig{Port: 445}) cleanup = func(context.Context) {} - if err = executor.dce.Connect(ctx, executor.creds, executor.target); err != nil { + if err = mod.dce.Connect(ctx, mod.creds, mod.target); err != nil { return nil, fmt.Errorf("connection to DCERPC failed: %w", err) } - executor.ctl, err = executor.dce.OpenSvcctl(ctx) + mod.ctl, err = mod.dce.OpenSvcctl(ctx) return } -func (executor *Executor) Exec(ctx context.Context, creds *adauth.Credential, target *adauth.Target, ecfg *exec.ExecutionConfig) (err error) { +func (mod *Module) Exec(ctx context.Context, creds *adauth.Credential, target *adauth.Target, ecfg *exec.ExecutionConfig) (err error) { vctx := context.WithoutCancel(ctx) - executor.log = zerolog.Ctx(ctx).With(). + mod.log = zerolog.Ctx(ctx).With(). Str("module", "scmr"). Str("method", ecfg.ExecutionMethod).Logger() - executor.creds = creds - executor.target = target + mod.creds = creds + mod.target = target if ecfg.ExecutionMethod == MethodCreate { if cfg, ok := ecfg.ExecutionMethodConfig.(MethodCreateConfig); !ok || cfg.ServiceName == "" { return errors.New("invalid configuration") } else { - if cleanup, err := executor.createClients(ctx); err != nil { + if cleanup, err := mod.createClients(ctx); err != nil { return fmt.Errorf("failed to create client: %w", err) } else { - executor.log.Debug().Msg("Created clients") + mod.log.Debug().Msg("Created clients") defer cleanup(ctx) } svc := &service{ createConfig: &cfg, name: cfg.ServiceName, } - scm, code, err := executor.openSCM(ctx) + scm, code, err := mod.openSCM(ctx) if err != nil { return fmt.Errorf("failed to open SCM with code %d: %w", code, err) } - executor.log.Debug().Msg("Opened handle to SCM") - code, err = executor.createService(ctx, scm, svc, ecfg) + mod.log.Debug().Msg("Opened handle to SCM") + code, err = mod.createService(ctx, scm, svc, ecfg) if err != nil { return fmt.Errorf("failed to create service with code %d: %w", code, err) } - executor.log.Info().Str("service", svc.name).Msg("Service created") + mod.log.Info().Str("service", svc.name).Msg("Service created") // From here on out, make sure the service is properly deleted, even if the connection drops or something fails. if !cfg.NoDelete { defer func() { // TODO: stop service? - if code, err = executor.deleteService(ctx, scm, svc); err != nil { - executor.log.Error().Err(err).Msg("Failed to delete service") // TODO + if code, err = mod.deleteService(ctx, scm, svc); err != nil { + mod.log.Error().Err(err).Msg("Failed to delete service") // TODO } - executor.log.Info().Str("service", svc.name).Msg("Service deleted successfully") + mod.log.Info().Str("service", svc.name).Msg("Service deleted successfully") }() } - if code, err = executor.startService(ctx, scm, svc); err != nil { + if code, err = mod.startService(ctx, scm, svc); err != nil { if errors.Is(err, context.DeadlineExceeded) || errors.Is(err, context.Canceled) { // In case of timeout or cancel, try to reestablish a connection to restore the service - executor.log.Info().Msg("Service start timeout/cancelled. Execution likely successful") - executor.log.Info().Msg("Reconnecting for cleanup procedure") + mod.log.Info().Msg("Service start timeout/cancelled. Execution likely successful") + mod.log.Info().Msg("Reconnecting for cleanup procedure") ctx = vctx - if _, err = executor.createClients(ctx); err != nil { - executor.log.Error().Err(err).Msg("Reconnect failed") + if _, err = mod.createClients(ctx); err != nil { + mod.log.Error().Err(err).Msg("Reconnect failed") - } else if scm, code, err = executor.openSCM(ctx); err != nil { - executor.log.Error().Err(err).Msg("Failed to reopen SCM") + } else if scm, code, err = mod.openSCM(ctx); err != nil { + mod.log.Error().Err(err).Msg("Failed to reopen SCM") - } else if svc.handle, code, err = executor.openService(ctx, scm, svc.name); err != nil { - executor.log.Error().Str("service", svc.name).Err(err).Msg("Failed to reopen service handle") + } else if svc.handle, code, err = mod.openService(ctx, scm, svc.name); err != nil { + mod.log.Error().Str("service", svc.name).Err(err).Msg("Failed to reopen service handle") } else { - executor.log.Debug().Str("service", svc.name).Msg("Reconnection successful") + mod.log.Debug().Str("service", svc.name).Msg("Reconnection successful") } } else { - executor.log.Error().Err(err).Msg("Failed to start service") + mod.log.Error().Err(err).Msg("Failed to start service") } } else { - executor.log.Info().Str("service", svc.name).Msg("Execution successful") + mod.log.Info().Str("service", svc.name).Msg("Execution successful") } } } else if ecfg.ExecutionMethod == MethodModify { @@ -123,102 +123,104 @@ func (executor *Executor) Exec(ctx context.Context, creds *adauth.Credential, ta } // Initialize protocol clients - if cleanup, err := executor.createClients(ctx); err != nil { + if cleanup, err := mod.createClients(ctx); err != nil { return fmt.Errorf("failed to create client: %w", err) } else { - executor.log.Debug().Msg("Created clients") + mod.log.Debug().Msg("Created clients") defer cleanup(ctx) } svc := &service{modifyConfig: &cfg, name: cfg.ServiceName} // Open SCM handle - scm, code, err := executor.openSCM(ctx) + scm, code, err := mod.openSCM(ctx) if err != nil { return fmt.Errorf("failed to create service with code %d: %w", code, err) } - executor.log.Debug().Msg("Opened handle to SCM") + mod.log.Debug().Msg("Opened handle to SCM") // Open service handle - if svc.handle, code, err = executor.openService(ctx, scm, svc.name); err != nil { + if svc.handle, code, err = mod.openService(ctx, scm, svc.name); err != nil { return fmt.Errorf("failed to open service with code %d: %w", code, err) } - executor.log.Debug().Str("service", svc.name).Msg("Opened service") + mod.log.Debug().Str("service", svc.name).Msg("Opened service") // Stop service before editing if !cfg.NoStart { - if code, err = executor.stopService(ctx, scm, svc); err != nil { - executor.log.Warn().Err(err).Msg("Failed to stop existing service") + if code, err = mod.stopService(ctx, scm, svc); err != nil { + mod.log.Warn().Err(err).Msg("Failed to stop existing service") } else if code == windows.ERROR_SERVICE_NOT_ACTIVE { - executor.log.Debug().Str("service", svc.name).Msg("Service is not running") + mod.log.Debug().Str("service", svc.name).Msg("Service is not running") } else { - executor.log.Info().Str("service", svc.name).Msg("Stopped existing service") + mod.log.Info().Str("service", svc.name).Msg("Stopped existing service") defer func() { - if code, err = executor.startService(ctx, scm, svc); err != nil { - executor.log.Error().Err(err).Msg("Failed to restore service state to running") + if code, err = mod.startService(ctx, scm, svc); err != nil { + mod.log.Error().Err(err).Msg("Failed to restore service state to running") } }() } } - if code, err = executor.queryServiceConfig(ctx, svc); err != nil { + if code, err = mod.queryServiceConfig(ctx, svc); err != nil { return fmt.Errorf("failed to query service configuration with code %d: %w", code, err) } - executor.log.Debug(). + mod.log.Debug(). Str("service", svc.name). Str("command", svc.svcConfig.BinaryPathName).Msg("Fetched existing service configuration") // Change service configuration - if code, err = executor.changeServiceConfigBinary(ctx, svc, cmd); err != nil { + if code, err = mod.changeServiceConfigBinary(ctx, svc, cmd); err != nil { return fmt.Errorf("failed to edit service configuration with code %d: %w", code, err) } defer func() { // Revert configuration - if code, err = executor.changeServiceConfigBinary(ctx, svc, svc.svcConfig.BinaryPathName); err != nil { - executor.log.Error().Err(err).Msg("Failed to restore service configuration") + if code, err = mod.changeServiceConfigBinary(ctx, svc, svc.svcConfig.BinaryPathName); err != nil { + mod.log.Error().Err(err).Msg("Failed to restore service configuration") } else { - executor.log.Info().Str("service", svc.name).Msg("Restored service configuration") + mod.log.Info().Str("service", svc.name).Msg("Restored service configuration") } }() - executor.log.Info(). + mod.log.Info(). Str("service", svc.name). Str("command", cmd).Msg("Changed service configuration") // Start service if !cfg.NoStart { - if code, err = executor.startService(ctx, scm, svc); err != nil { + if code, err = mod.startService(ctx, scm, svc); err != nil { if errors.Is(err, context.DeadlineExceeded) || errors.Is(err, context.Canceled) { // In case of timeout or cancel, try to reestablish a connection to restore the service - executor.log.Info().Msg("Service start timeout/cancelled. Execution likely successful") - executor.log.Info().Msg("Reconnecting for cleanup procedure") + mod.log.Info().Msg("Service start timeout/cancelled. Execution likely successful") + mod.log.Info().Msg("Reconnecting for cleanup procedure") ctx = vctx - if _, err = executor.createClients(ctx); err != nil { - executor.log.Error().Err(err).Msg("Reconnect failed") + if _, err = mod.createClients(ctx); err != nil { + mod.log.Error().Err(err).Msg("Reconnect failed") - } else if scm, code, err = executor.openSCM(ctx); err != nil { - executor.log.Error().Err(err).Msg("Failed to reopen SCM") + } else if scm, code, err = mod.openSCM(ctx); err != nil { + mod.log.Error().Err(err).Msg("Failed to reopen SCM") - } else if svc.handle, code, err = executor.openService(ctx, scm, svc.name); err != nil { - executor.log.Error().Str("service", svc.name).Err(err).Msg("Failed to reopen service handle") + } else if svc.handle, code, err = mod.openService(ctx, scm, svc.name); err != nil { + mod.log.Error().Str("service", svc.name).Err(err).Msg("Failed to reopen service handle") } else { - executor.log.Debug().Str("service", svc.name).Msg("Reconnection successful") + mod.log.Debug().Str("service", svc.name).Msg("Reconnection successful") } } else { - executor.log.Error().Err(err).Msg("Failed to start service") + mod.log.Error().Err(err).Msg("Failed to start service") } } else { - executor.log.Info().Str("service", svc.name).Msg("Started service") + mod.log.Info().Str("service", svc.name).Msg("Started service") } defer func() { // Stop service - if code, err = executor.stopService(ctx, scm, svc); err != nil { - executor.log.Error().Err(err).Msg("Failed to stop service") + if code, err = mod.stopService(ctx, scm, svc); err != nil { + mod.log.Error().Err(err).Msg("Failed to stop service") } else { - executor.log.Info().Str("service", svc.name).Msg("Stopped service") + mod.log.Info().Str("service", svc.name).Msg("Stopped service") } }() } } + } else { + return fmt.Errorf("invalid method: %s", ecfg.ExecutionMethod) } return err } -- cgit v1.2.3 From 6fe1d2cf9ead0a868ef3c86502f904ae97c74116 Mon Sep 17 00:00:00 2001 From: Bryan McNulty Date: Tue, 4 Mar 2025 02:44:57 -0600 Subject: +Bumped adauth. fork is no longer necessary --- cmd/root.go | 2 +- cmd/scmr.go | 2 +- go.mod | 10 +++++----- go.sum | 20 ++++++++++---------- pkg/client/dcerpc/client.go | 2 +- pkg/client/dcerpc/dcerpc.go | 4 ++-- pkg/exec/exec.go | 2 +- pkg/exec/scmr/exec.go | 2 +- pkg/exec/scmr/module.go | 2 +- pkg/exec/tsch/exec.go | 2 +- pkg/exec/tsch/module.go | 2 +- 11 files changed, 25 insertions(+), 25 deletions(-) (limited to 'pkg/exec/scmr/exec.go') diff --git a/cmd/root.go b/cmd/root.go index fdc0ad6..473f1ad 100644 --- a/cmd/root.go +++ b/cmd/root.go @@ -3,7 +3,7 @@ package cmd import ( "context" "fmt" - "github.com/bryanmcnulty/adauth" + "github.com/RedTeamPentesting/adauth" "github.com/rs/zerolog" "github.com/spf13/cobra" "os" diff --git a/cmd/scmr.go b/cmd/scmr.go index df0bc84..8105ff6 100644 --- a/cmd/scmr.go +++ b/cmd/scmr.go @@ -1,7 +1,7 @@ package cmd import ( - "github.com/bryanmcnulty/adauth" + "github.com/RedTeamPentesting/adauth" "github.com/spf13/cobra" "github.com/FalconOpsLLC/goexec/pkg/exec" diff --git a/go.mod b/go.mod index 9da0e5e..2b64e5b 100644 --- a/go.mod +++ b/go.mod @@ -3,7 +3,7 @@ module github.com/FalconOpsLLC/goexec go 1.24.0 require ( - github.com/bryanmcnulty/adauth v0.0.0-20250227005704-df9302d730c2 + github.com/RedTeamPentesting/adauth v0.1.1-0.20250304075117-acd47d454877 github.com/oiweiwei/go-msrpc v1.2.1 github.com/rs/zerolog v1.33.0 github.com/spf13/cobra v1.9.1 @@ -25,9 +25,9 @@ require ( github.com/oiweiwei/go-smb2.fork v1.0.0 // indirect github.com/oiweiwei/gokrb5.fork/v9 v9.0.2 // indirect github.com/spf13/pflag v1.0.6 // indirect - golang.org/x/crypto v0.32.0 // indirect - golang.org/x/net v0.34.0 // indirect - golang.org/x/sys v0.29.0 // indirect - golang.org/x/text v0.21.0 // indirect + golang.org/x/crypto v0.35.0 // indirect + golang.org/x/net v0.35.0 // indirect + golang.org/x/sys v0.30.0 // indirect + golang.org/x/text v0.22.0 // indirect software.sslmate.com/src/go-pkcs12 v0.5.0 // indirect ) diff --git a/go.sum b/go.sum index 439cca5..a46de81 100644 --- a/go.sum +++ b/go.sum @@ -1,5 +1,5 @@ -github.com/bryanmcnulty/adauth v0.0.0-20250227005704-df9302d730c2 h1:AxVqt9SbxfGqhEO8wwssTq0PYQfxuSIFUt4hMGV6KZw= -github.com/bryanmcnulty/adauth v0.0.0-20250227005704-df9302d730c2/go.mod h1:h0dSYNaF2657vK+RY1ntfWKnSd6LlZHIWHyJq8D4VUA= +github.com/RedTeamPentesting/adauth v0.1.1-0.20250304075117-acd47d454877 h1:n5V0EER+EvvmUZitR5zGFUMyoIHnI12SWFMciI7kh70= +github.com/RedTeamPentesting/adauth v0.1.1-0.20250304075117-acd47d454877/go.mod h1:iHf/fY7CueB7qLHZ5YgTZXvrVCSLJy4+tAifOSNLAFQ= github.com/coreos/go-systemd/v22 v22.5.0/go.mod h1:Y58oyj3AT4RCenI/lSvhwexgC+NSVTIJ3seZv2GcEnc= github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= @@ -70,8 +70,8 @@ github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5t golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= golang.org/x/crypto v0.6.0/go.mod h1:OFC/31mSvZgRz0V1QTNCzfAI1aIRzbiufJtkMIlEp58= -golang.org/x/crypto v0.32.0 h1:euUpcYgM8WcP71gNpTqQCn6rC2t6ULUPiOzfWaXVVfc= -golang.org/x/crypto v0.32.0/go.mod h1:ZnnJkOaASj8g0AjIduWNlq2NRxL0PlBrbKVyZ6V/Ugc= +golang.org/x/crypto v0.35.0 h1:b15kiHdrGCHrP6LvwaQ3c03kgNhhiMgvlhxHQhmg2Xs= +golang.org/x/crypto v0.35.0/go.mod h1:dy7dXNW32cAb/6/PRuTNsix8T+vJAqvuIy5Bli/x0YQ= golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4= golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= @@ -79,8 +79,8 @@ golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c= golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs= golang.org/x/net v0.7.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs= -golang.org/x/net v0.34.0 h1:Mb7Mrk043xzHgnRM88suvJFwzVrRfHEHJEl5/71CKw0= -golang.org/x/net v0.34.0/go.mod h1:di0qlW3YNM5oh6GqDGQr92MyTozJPmybPK4Ev/Gm31k= +golang.org/x/net v0.35.0 h1:T5GQRQb2y08kTAByq9L4/bz8cipCdA8FbRTXewonqY8= +golang.org/x/net v0.35.0/go.mod h1:EglIi67kWsHKlRzzVMUD93VMSWGFOMSZgxFjparz1Qk= golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= @@ -92,8 +92,8 @@ golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBc golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.29.0 h1:TPYlXGxvx1MGTn2GiZDhnjPA9wZzZeGKHHmKhHYvgaU= -golang.org/x/sys v0.29.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= +golang.org/x/sys v0.30.0 h1:QjkSwP/36a20jFYWkSue1YwXzLmsV5Gfq7Eiy72C1uc= +golang.org/x/sys v0.30.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k= @@ -101,8 +101,8 @@ golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ= golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= -golang.org/x/text v0.21.0 h1:zyQAAkrwaneQ066sspRyJaG9VNi/YJ1NfzcGB3hZ/qo= -golang.org/x/text v0.21.0/go.mod h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ= +golang.org/x/text v0.22.0 h1:bofq7m3/HAFvbF51jz3Q9wLg3jkvSPuiZu/pD1XwgtM= +golang.org/x/text v0.22.0/go.mod h1:YRoo4H8PVmsu+E3Ou7cqLVH8oXWIHVoX0jqUWALQhfY= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc= diff --git a/pkg/client/dcerpc/client.go b/pkg/client/dcerpc/client.go index 5b5b935..d9d8d71 100644 --- a/pkg/client/dcerpc/client.go +++ b/pkg/client/dcerpc/client.go @@ -2,7 +2,7 @@ package dcerpc import ( "context" - "github.com/bryanmcnulty/adauth" + "github.com/RedTeamPentesting/adauth" ) type Client interface { diff --git a/pkg/client/dcerpc/dcerpc.go b/pkg/client/dcerpc/dcerpc.go index b2e53bd..5c9a734 100644 --- a/pkg/client/dcerpc/dcerpc.go +++ b/pkg/client/dcerpc/dcerpc.go @@ -4,8 +4,8 @@ import ( "context" "errors" "fmt" - "github.com/bryanmcnulty/adauth" - "github.com/bryanmcnulty/adauth/dcerpcauth" + "github.com/RedTeamPentesting/adauth" + "github.com/RedTeamPentesting/adauth/dcerpcauth" "github.com/oiweiwei/go-msrpc/dcerpc" "github.com/oiweiwei/go-msrpc/msrpc/epm/epm/v3" "github.com/oiweiwei/go-msrpc/msrpc/scmr/svcctl/v2" diff --git a/pkg/exec/exec.go b/pkg/exec/exec.go index 91bc065..16fa543 100644 --- a/pkg/exec/exec.go +++ b/pkg/exec/exec.go @@ -2,7 +2,7 @@ package exec import ( "context" - "github.com/bryanmcnulty/adauth" + "github.com/RedTeamPentesting/adauth" ) type CleanupConfig struct { diff --git a/pkg/exec/scmr/exec.go b/pkg/exec/scmr/exec.go index c2702a3..ab4cfdd 100644 --- a/pkg/exec/scmr/exec.go +++ b/pkg/exec/scmr/exec.go @@ -7,7 +7,7 @@ import ( "github.com/FalconOpsLLC/goexec/pkg/client/dcerpc" "github.com/FalconOpsLLC/goexec/pkg/exec" "github.com/FalconOpsLLC/goexec/pkg/windows" - "github.com/bryanmcnulty/adauth" + "github.com/RedTeamPentesting/adauth" "github.com/rs/zerolog" ) diff --git a/pkg/exec/scmr/module.go b/pkg/exec/scmr/module.go index b35c746..fd57bc7 100644 --- a/pkg/exec/scmr/module.go +++ b/pkg/exec/scmr/module.go @@ -2,7 +2,7 @@ package scmrexec import ( "github.com/FalconOpsLLC/goexec/pkg/client/dcerpc" - "github.com/bryanmcnulty/adauth" + "github.com/RedTeamPentesting/adauth" "github.com/oiweiwei/go-msrpc/msrpc/scmr/svcctl/v2" "github.com/rs/zerolog" ) diff --git a/pkg/exec/tsch/exec.go b/pkg/exec/tsch/exec.go index 030a016..4157ec4 100644 --- a/pkg/exec/tsch/exec.go +++ b/pkg/exec/tsch/exec.go @@ -8,7 +8,7 @@ import ( "github.com/FalconOpsLLC/goexec/internal/util" dce "github.com/FalconOpsLLC/goexec/pkg/client/dcerpc" "github.com/FalconOpsLLC/goexec/pkg/exec" - "github.com/bryanmcnulty/adauth" + "github.com/RedTeamPentesting/adauth" "github.com/oiweiwei/go-msrpc/dcerpc" "github.com/oiweiwei/go-msrpc/msrpc/tsch/itaskschedulerservice/v1" "github.com/rs/zerolog" diff --git a/pkg/exec/tsch/module.go b/pkg/exec/tsch/module.go index 3112902..077951b 100644 --- a/pkg/exec/tsch/module.go +++ b/pkg/exec/tsch/module.go @@ -3,7 +3,7 @@ package tschexec import ( "context" "github.com/FalconOpsLLC/goexec/pkg/client/dcerpc" - "github.com/bryanmcnulty/adauth" + "github.com/RedTeamPentesting/adauth" "github.com/oiweiwei/go-msrpc/msrpc/tsch/itaskschedulerservice/v1" "github.com/rs/zerolog" "time" -- cgit v1.2.3