@@ -14,7 +14,6 @@ class NXCModule:
1414
1515 # Reference table from MSRC report
1616 # https://msrc.microsoft.com/update-guide/fr-FRS/vulnerability/CVE-2025-33073
17-
1817 MSRC_PATCHES = { # key = (major, minor, build), value = minimum patched UBR
1918 (6 , 3 , 9600 ): 22620 , # Windows Server 2012 R2
2019 (6 , 2 , 9200 ): 25522 , # Windows Server 2012
@@ -54,7 +53,7 @@ def on_login(self, context, connection):
5453 rpc .set_kerberos (connection .kerberos , kdcHost = connection .kdcHost )
5554 dce = rpc .get_dce_rpc ()
5655 if connection .kerberos :
57- dce .set_auth_type (RPC_C_AUTHN_GSS_NEGOTIATE )
56+ dce .set_auth_type (RPC_C_AUTHN_GSS_NEGOTIATE )
5857 try :
5958 dce .connect ()
6059 dce .bind (rrp .MSRPC_UUID_RRP )
@@ -75,7 +74,7 @@ def on_login(self, context, connection):
7574 self .context .log .info (f"RemoteRegistry is probably deactivated: { e } " )
7675 else :
7776 self .context .log .debug (f"Unexpected error: { e } " )
78-
77+
7978 def trigger_winreg (self , connection , context ):
8079 # Original idea from https://twitter.com/splinter_code/status/1715876413474025704
8180 # Basically triggers the RemoteRegistry to start without admin privs
@@ -93,4 +92,3 @@ def trigger_winreg(self, connection, context):
9392 context .log .debug (str (e ))
9493 # Give remote registry time to start
9594 time .sleep (1 )
96-
0 commit comments