CaledoniaProject
CaledoniaProject
Hmm, I'm on Windows 7 x86, using 32 bit JDK with 32 bit rattler (downloaded from https://github.com/sensepost/rattler/releases) Running CMD as elevated administrator
I'm expecting nmap to return the following output: ``` PORT STATE SERVICE VERSION 8821/tcp open http ```
@dingusgh service detection results in "tcp" instead ``` # nmap 45.60.20.108 -p 8821 -sV Starting Nmap 7.80 ( https://nmap.org ) at 2022-03-06 07:22 CST Nmap scan report for 45.60.20.108 Host...
Can you update the code to ignore such error and print a warning instead?
It happens when I choose "Use kerberos only", the other options works. 
Okay, reproduced on another AD environment. Just need an invalid `/msdsspn` parameter to trigger the overflow issue.
这个解决了没有呀,我现在还是手动 strip 的
@Kudaes Which part of the code references the RSAT library?
1. 这个改完了,生成的curl命令应该就没法用了,你看看 2. getRequestURL在什么场景下不兼容反向代理
主要问题还是第一个,你这个改完之后,curl就没法用了。而且你不改,反向代理也是可以用的,不知道你遇到了啥问题。。