-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
help,plz #1
Comments
Hi! It's a bit tricky to tell exactly what is going on here just from this, but my suspicion would be that the version of SCCM that you are using does not support SHA256 signatures. The newest versions do. You can test SHA1 signatures by commenting line 484 and 490 and uncommenting lines 483 and 489. Alternatively, enable the Require SHA-256 option on the Signing and Encryption options on the SCCM MP and it should start giving you a certificate that can generate SHA256 signatures. |
Hello @chrispanayi ,
|
Hello @chrispanayi , After the modifications, I am getting the following error. What could the issue be, network connectivity? |
@kaleemshaik7867 Depends on the context of how you are calling it. The tool doesn't have support for HTTPS management points if they require client certificates at the moment (I usually handle this with an intercepting proxy that handles the TLS handshaking); but it also could be a DNS resolution issue, or HTTP on the management point is blocked |
Hello @chrispanayi, My Management points are reachable, and they are on HTTPS. Would you please give more details on how you handle this via intercepting proxy? |
First, confirm that client certificates are required; I believe this would be the case from the previous environments I have seen this in. This is the main thing that is unsupported. If it is browsable over HTTPS without a client certificate, you can comment out line 709 and set USING_TLS to True in line 38. If it is using client certificates, you need to set up something like Burp Proxy to handle the client certificate authentication flow for PXEThief (something like https://www.smeegesec.com/2013/05/using-client-ssl-certificates-with-burp.html) and proxy PXEThief through Burp (invisible proxying or set USING_PROXY to True and configure your proxy settings in line 712) |
Hello @chrispanayi , I tried to set up the Burp and client certificate authentication, and I see the following error. |
That is tough to debug with no additional context. It looks like the management point is not responding in the way the tool expects? Would look at Burp and see if the response to the HTTP request that the tool is making is properly XML formatted. In general, after the signatures are generated the next part of the code makes specially formatted HTTP requests to the MP, and it should be responding with XML. There are specific edge cases (like when I encountered HTTPS MPs, where it doesn't encrypt the HTTP responses like it does over normal HTTP). If the responses are as expected, and not something like a 404, then I would think the error is popping up in one of the edge case handling parts of the code |
The text was updated successfully, but these errors were encountered: