Commit Graph

25 Commits

Author SHA1 Message Date
Dave 4a21cbd618 Negotiation fails for servers where 'NTLMv2 session security' is required (#18)
If a server has specified that NTLMv2 session security is required,
    then negotiation will fail as the client does not advertise this during
    the handshake. The negoiate message needs to include the relevant
    flag 'negotiateFlagNTLMSSPNEGOTIATEEXTENDEDSESSIONSECURITY'

    To test enable this on the remote server by using regedt32 to modify the
    key
    HKLM\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0\NtlmMinServerSec and
    set the value to 0x20080000
2018-08-10 10:55:52 -07:00
Christopher Boumenot a218ec793f move to a current version of Go (#19) 2018-08-09 11:12:27 -07:00
Paul Meyer 4b934ac9da Merge pull request #13 from justdan96/master
add version, domain and workstation fields
2018-04-16 10:50:57 -07:00
justdan96 0175985677 fix comment on new func 2018-04-15 03:38:39 +01:00
justdan96 b1778f7bea gofmt 2018-04-15 03:34:21 +01:00
justdan96 74d659d795 use SplitN for domain parsing, moved to separate function
added battery of tests for username, domain, workstation and expected negotiate message bytes
2018-04-15 03:31:17 +01:00
justdan96 235d683359 gofmt 2018-04-13 09:50:16 +01:00
Dan ca37395f51 Remove underscore from var 2018-04-12 18:47:41 +01:00
Dan df1f808002 add version, domain and workstation fields
Add version support from jh125486
Add workstation and domain support from jh125486
Enable to extract domain from username
2018-04-12 18:05:24 +01:00
Paul Meyer c92175d540 Merge pull request #11 from PaluMacil/patch-1
update README with example
2017-08-02 20:49:30 -07:00
Dan Wolf 221c18c814 update README with example
This fixes #10
2017-07-25 09:51:09 -04:00
Paul Meyer 29affced64 Merge pull request #8 from lafriks/master
Support for auth when server responds with Www-Authenticate: NTLM
2017-02-06 11:08:56 -08:00
Lauris Bukšis-Haberkorns c70fcef895 Support for Www-Authenticate: NTLM 2017-01-27 14:39:00 +02:00
Paul Meyer 2d5c786339 Merge pull request #7 from Azure/coc
Add CoC notice
2016-06-28 09:49:40 -07:00
Paul Meyer c9deec49af Add CoC notice 2016-06-28 09:48:49 -07:00
Paul Meyer 686fb24c00 drain request body for connection reuse (#6) 2016-06-17 12:47:12 -07:00
Quoc-Viet Nguyen e0b63eb299 Handle http redirect (#4)
- Fixed panic if req.Body is nil or basicAuth is not set
- Switched over to http.DefaultTransport if RoundTripper is not provided

Closes #2, #3
2016-04-12 15:49:15 -07:00
Christopher Boumenot 3ea3d20764 Don't go get vet, commit to 1.6. (#5) 2016-04-12 15:47:34 -07:00
Paul Meyer eca2fbb4d9 Update README.md 2016-03-04 13:48:32 -08:00
Paul Meyer e9af32f2be Update README.md
Fix badge links
2016-03-04 13:46:31 -08:00
Paul Meyer 5aa0a4a5af Update LICENSE
Comply with CELA for move to Azure organisation
2016-03-04 13:44:56 -08:00
Paul Meyer d454815987 Add badges 2015-10-16 21:54:06 -07:00
Paul Meyer c3e922711f Initial commit of implementation 2015-10-16 21:50:49 -07:00
Paul Meyer 8879b4c6f2 Create .travis.yml 2015-10-16 21:46:55 -07:00
Paul Meyer 154e18f0b4 Initial commit 2015-10-16 21:17:33 -07:00