scapy.layers.msrpce.msnrpc

[MS-NRPC] Netlogon Remote Protocol

https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-nrpc/ff8f970f-3e37-40f7-bd4b-af7336e4792f

scapy.layers.msrpce.msnrpc.ComputeCopySeqNumber(ClientSequenceNumber, client)[source]
scapy.layers.msrpce.msnrpc.InitLMKey(KeyIn)[source]
class scapy.layers.msrpce.msnrpc.NetlogonClient(auth_level=RPC_C_AUTHN_LEVEL.NONE, domainname=None, computername=None, verb=True)[source]

Bases: DCERPC_Client

alter_context()[source]
connect_and_bind(remoteIP)[source]
create_authenticator()[source]
negotiate_sessionkey(secretHash)[source]
setSessionKey(SessionKey)[source]
validate_authenticator(auth)[source]
class scapy.layers.msrpce.msnrpc.NetlogonSSP(SessionKey, computername, domainname, **kwargs)[source]

Bases: SSP

class CONTEXT(IsClient, req_flags=None)[source]

Bases: CONTEXT

AES
ClientSequenceNumber
IsClient
GSS_Accept_sec_context(Context, val=None)[source]
GSS_GetMICEx(Context, msgs, qop_req=0)[source]
GSS_Init_sec_context(Context, val=None, req_flags: GSS_C_FLAGS | None = None)[source]
GSS_UnwrapEx(Context, msgs, signature)[source]
GSS_VerifyMICEx(Context, msgs, signature)[source]
GSS_WrapEx(Context, msgs, qop_req=0)[source]
MaximumSignatureLength(Context: CONTEXT)[source]

Returns the Maximum Signature length.

This will be used in auth_len in DceRpc5, and is necessary for PFC_SUPPORT_HEADER_SIGN to work properly.

class STATE(value, names=None, *values, module=None, qualname=None, type=None, start=1, boundary=None)[source]

Bases: STATE

CLI_SENT_NL = 2
INIT = 1
SRV_SENT_NL = 3
auth_type = 68
scapy.layers.msrpce.msnrpc.NewAuthenticatorAndCredential(ClientStoredCredential, Sk)[source]