Coercer icon indicating copy to clipboard operation
Coercer copied to clipboard

A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.

Results 15 Coercer issues
Sort by recently updated
recently updated
newest added

It is only relevant for exchange servers: https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/ If you want to keep the core checks clean from application specific checks that may only work on a small subset of...

enhancement
new-method

https://github.com/evilashz/CheeseOunce

Hello. Currently `coercer` supports the following rpc interfaces: ``` /opt/Coercer/coercer/protocols(master) » grep -r uuid MS_EFSR.py: uuid = "c681d488-d850-11d0-8c52-00c04fd90f7e" MS_FSRVP.py: uuid = "a8e0653c-2744-4389-a61d-7373df8b2292" MS_RPRN.py: uuid = "12345678-1234-ABCD-EF00-0123456789AB" MS_DFSNM.py: uuid = "4fc742e0-4a10-11cf-8273-00aa004ae673"...

enhancement

Hi, I love your tool and I have used it a lot! However, today during testing in my AD lab I suddenly get the error "SMB SessionError: STATUS_PIPE_DISCONNECTED" when attempting...

bug

See #67. I included portions of Responder's code with minimal modifications. This means that Coercer must be GPL licensed. In this approach, we monkeypatch Responder's `SaveToDb` function to modify `control_structure`...

enhancement

Hi, I like coercer a lot, in particular for identifying DCs which have NTLMv1 enabled. What I always do is run responder in analyze mode and then coercer in coerce...

enhancement