%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /lib/python3/dist-packages/samba/emulate/__pycache__/
Upload File :
Create Path :
Current File : //lib/python3/dist-packages/samba/emulate/__pycache__/traffic_packets.cpython-312.pyc

�

�I�dp��P�ddlZddlZddlZddlmZddlmZmZmZm	Z	m
Z
mZddlm
Z
ddlmZddlmZddlmZddlmZmZmZdd	lmZdd
lmZmZddlZddlZddlm Z d�Z!d
�Z"ejFejHejJejLejNejPejRejTejVejXejZej\ej^ej`ejbejdejfejhejjejlejnejpejrejtejvejxejzgZ>d�Z?d�Z@d�ZAe@ZBe@ZCe@ZDe@ZEe@ZFe@ZGe@ZHe@ZId�ZJd�ZKd�ZLe@ZMd�ZNeOe�D�cgc]}d|vr	ePe|���c}ZQd�ZRd�ZSd�ZTe@ZUe@ZVe@ZWe@ZXd�ZYe@ZZd�Z[e@Z\d�Z]d�Z^e@Z_e@Z`e@Zae@Zbe@Zce@Zde@Zee@Zfe@Zge@Zhe@Zie@Zje@Zke@Zld�Zmd�Znd�Zoe@Zpe@Zqe@Zre@Zsd �Ztd!�Zud"�Zve@Zwe@Zxe@Zye@Zze@Z{e@Z|e@Z}e@Z~d#�Zd$�Z�e@Z�d%�Z�d&�Z�d'�Z�d(�Z�d)�Z�d*�Z�d+�Z�d,�Z�d-�Z�d.�Z�d/�Z�d0d1gZ�d2�Z�e@Z�d3�Z�d4�Z�d5�Z�d6�Z�d7�Z�d8�Z�d9�Z�d:�Z�e@Z�d;�Z�e@Z�e@Z�d<�Z�d=�Z�e@Z�d>�Z�d?�Z�ycc}w)@�N)�Net)�security�drsuapi�nbt�lsa�netlogon�ntlmssp)�netr_WorkstationInformation)�dom_sid)�Node)�ndr_pack)�CLI_CRED_NTLMv2_AUTH�MUST_USE_KERBEROS�DONT_USE_KERBEROS)�
NTSTATUSError)�NT_STATUS_OBJECT_NAME_NOT_FOUND�NT_STATUS_NO_SUCH_DOMAIN)�
SCOPE_BASEc�@�tj|�jS)N)�ctypes�c_uint32�value)�vs �?/usr/lib/python3/dist-packages/samba/emulate/traffic_packets.py�uint32r*s���?�?�1��#�#�#�c�F�|�yt|jd�}||k(ryy)NFrT)r�args)�runtime�val�err32s   r�check_runtime_errorr".s)������7�<�<��?�#�E���|��rc� �td|z�y)NzWarning: %s)�print)�messages r�warningr&Xs��	�
2�g�
>�?rc��y�NF���packet�conversation�contexts   r�null_packetr.�s��rc��t|j|j��}|j|jj	d�t
jt
jzt
jz��y)N)�creds�lp�realm)�domain�flagsT)	rr0r1�finddc�getr�NBT_SERVER_LDAP�
NBT_SERVER_DS�NBT_SERVER_WRITABLE)r+r,r-�nets    r�packet_cldap_3r;�s`��

�G�M�M�g�j�j�
1�C��J�J�g�j�j�n�n�W�-��)�)��'�'�(��-�-�.��0�rc�\�|jj�tk(rtd�y)NzQKerberos disabled but have dcerpc Alter_context_resp indicating Kerberos was usedF)�
user_creds�get_kerberos_staterr&r*s   r�packet_dcerpc_15r?�s,�����,�,�.�2C�C��/�	0�rc�\�|jj�tk(rtd�y)NzBKerberos enabled but have dcerpc AUTH3 indicating NTLMSSP was usedF)r=r>rr&r*s   r�packet_dcerpc_16rA�s,�����,�,�.�2C�C��.�	/�rc�j�|j�\}}tjj||�y�NT)�guess_a_dns_lookup�dns�resolver�query)r+r,r-�name�rtypes     r�packet_dns_0rJ�s+���,�,�.�K�D�%��L�L���t�U�#�rc�&�|jd�yrC)�get_drsuapi_connection_pairr*s   r�packet_drsuapi_0rM�s���'�'��-�r�NAME_FORMATc�h�|j�\}}tj�}|j|_tj
�}d|_d|_tjt�|_d|_d|_
d|_d|_|g|_|j!|d|�\}}y)Nr�i�i	�T)rLr�DsNameString�server�str�DsNameRequest1�format_flags�format_offered�random�choice�name_formats�format_desired�codepage�language�count�names�DsCrackNames)	r+r,r-�drs�handler_�req�result�ctrs	         r�packet_drsuapi_12rf�s����5�5�7�K�C��� � �"�E����E�I�
�
 �
 �
"�C��C���C�����|�4�C���C�L��C�L��C���C�I���C�I��$�$�V�Q��4�M�V�S�rc�^�tj�}tj|_d|_|j
|_d|_tj�}dj|j�|_|g|_|j�\}}|j|d|�\}}y)NrrQzfoo/{}T)r�DsWriteAccountSpnRequest1� DRSUAPI_DS_SPN_OPERATION_REPLACE�	operation�unknown1�user_dn�	object_dnr^rR�format�usernamerT�	spn_namesrL�DsWriteAccountSpn)	r+r,r-rc�spn_namerarb�level�ress	         r�packet_drsuapi_13ru�s���
�
+�
+�
-�C��<�<�C�M��C�L��O�O�C�M��C�I��#�#�%�H��?�?�7�#3�#3�4�H�L��J�C�M��7�7�9�M�S�&��(�(���C�8�L�U�C�rc�f�|j�\}}|j|�|jd=y)N���T)rL�DsUnbind�drsuapi_connections)r+r,r-rarbs     r�packet_drsuapi_1rzs1���7�7�9�M�S�&��L�L����#�#�B�'�rc�:�|jjt�|jjt�|jjt�|j
jt�|jjt�yr()r=�set_kerberos_stater�user_creds_bad�
machine_creds�machine_creds_badr0r*s   r�packet_kerberos_r�sn�����)�)�*;�<����-�-�.?�@����,�,�->�?����0�0�1B�C��M�M�$�$�%6�7�rc�v�|jddk(r|jdd��y|jdd��y)N��simpleT)�newr�F)�extra�get_ldap_connectionr*s   r�
packet_ldap_0r�0sB��
�|�|�A��(�"��#�#��T�#�:��	�#�#��U�#�;�rc�"�|jdd�=y)NrwF)�ldap_connectionsr*s   r�
packet_ldap_2r�@s��	� � ���%�rc�"�|j\}}}}}}}	|st}|j�}
|j|�}|�|dk(r|tk7r|j	|||�}|
j||t
|�|jd�dg��y)N��,zpaged_results:1:1000)�
expression�scope�attrs�controlsT)r�rr��get_matching_dn�guess_search_filter�search�int�split)r+r,r-r��dn_sig�filterr�r��desc�oid�samdb�dns            r�
packet_ldap_3r�Gs���8>�|�|�4�U�F�F�E�5�$������'�'�)�E�	�	 �	 ��	(�B�	��&�B�,�E�Z�,?��,�,�U�F�B�?��	�L�L��"��5�z��{�{�3�'�1�2�	�4�
rc�X�|j�}tj�}|jd|tj
�}tj�}tjd�tjd�g}tj}d}	|j|||||	�y)Nr��This Organization�Digest AuthenticationrT)
� get_lsarpc_named_pipe_connectionr�ObjectAttribute�OpenPolicy2r�SEC_FLAG_MAXIMUM_ALLOWED�
TransSidArray�String�LSA_LOOKUP_NAMES_ALL�LookupNames)
r+r,r-�c�
objectAttr�
pol_handle�sidsr_rsr^s
          r�packet_lsarpc_14r��s����0�0�2�A��$�$�&�J����s�J�'�@�@�B�J�
����D�
�Z�Z�+�
,�
�Z�Z�/�
0�
2�E��$�$�E�
�E��M�M�*�e�T�5�%�8�rc��|j�}tj�}|jd|tj
�}tj�}tj�}td�}||_	|g|_
d|_tj�}	tj}
d}|j|||	|
|�y)Nr��S-1-5-7rQrT)r�rr�r�rr��SidArray�SidPtrr�sidr��num_sids�TransNameArrayr��
LookupSids)r+r,r-r�r�r�r�r��xr_rsr^s            r�packet_lsarpc_15r��s����0�0�2�A��$�$�&�J����s�J�'�@�@�B�J��<�<�>�D�

�*�*�,�C��	��A��C�G���D�I��D�M���� �E��$�$�E�
�E��L�L��T�5�%��7�rc�f�|j�}tj�}|jd|tj
�}t	j|j�}d}	|j|||�y#t$r+}t|t�st|t�s�Yd}~yd}~wwxYw)Nr�rQT)
r�rr�r�rr�r�
domain_sid�QueryTrustedDomainInfoBySidrr"rr)	r+r,r-r�r�r��domsidrs�errors	         r�packet_lsarpc_39r��s���	�0�0�2�A��$�$�&�J����s�J�'�@�@�B�J��
�
�g�0�0�
1�F�
�E��	�%�%�j�&�%�@�����#�5�*I�J�+�E�3K�L������s�(A<�<	B0�!B+�+B0c�n�|j�}tj�}tj�}t	d�}||_|g|_d|_tj�}tj}d}	tj}
tj}|j||||	|
|�y)Nr�rQrT)
�get_lsarpc_connectionrr�r�rr�r�r��TransNameArray2r��'LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES�LSA_CLIENT_REVISION_2�LookupSids3)r+r,r-r�r�r�r�r_rsr^�lookup_options�client_revisions            r�packet_lsarpc_76r��s����%�%�'�A��<�<�>�D�

�*�*�,�C��	��A��C�G���D�I��D�M����!�E��$�$�E�
�E��@�@�N��/�/�O��M�M�$��u�e�^�_�M�rc�0�|j�}tj�}tjd�tjd�g}tj}d}tj
}tj}	|j||||||	�y)Nr�r�rT)r�r�TransSidArray3r�r�r�r��LookupNames4)
r+r,r-r�r�r_rsr^r�r�s
          r�packet_lsarpc_77r��s~���%�%�'�A���� �D�
�Z�Z�+�
,�
�Z�Z�/�
0�
2�E��$�$�E�
�E��@�@�N��/�/�O��N�N�5�$��u�n�o�N�rc�f�t�}	|jd|jdd��y#YyxYw)N�ANAME�F)�timeout�	broadcastT)r�
query_namerS)r+r,r-�ns    r�
packet_nbns_0r��s8����A�
�	���W�g�n�n�a�5��I���
���s�,�0c��|j�}|j�\}}t�}|j|j|j
||d|�y)N�T)�get_netlogon_connection�get_authenticatorr
�netr_LogonGetDomainInforS�netbios_name)r+r,r-r��auth�succrGs       r�packet_rpc_netlogon_29r�#sX���'�'�)�A��,�,�.�L�T�4�'�)�E����g�n�n�%�2�2�"�"��#�%�rc���|j�}|j�\}}d}|jj�j	d�}t|�}t
j||z
�D�	cgc]}	t|	t�r|	n
t|	���!}
}	tj�}||_
|
|D�	cgc]}	t|	t�r|	n
t|	���!c}	z|_|jj|�|j!|j"|jj%�|jj'�|j(||�ycc}	wcc}	w)Niz	utf-16-leT)r�r�r~�get_password�encode�len�os�urandom�
isinstancer��ordr�netr_CryptPassword�length�data�encrypt_netr_crypt_password�netr_ServerPasswordSet2rS�get_username�get_secure_channel_typer�)r+r,r-r�r�r��DATA_LEN�newpass�pwd_lenr��filler�pwds            r�packet_rpc_netlogon_30r�2s1���'�'�)�A��,�,�.�L�T�4��H��#�#�0�0�2�9�9�+�F�G��'�l�G�<>�J�J�x�RY�GY�<Z�[�q�J�q�#�&�q�C��F�2�[�F�[�
�
%�
%�
'�C��C�J��g�N��j��C�0��c�!�f�<�N�N�C�H����5�5�c�:����g�n�n�&�3�3�@�@�B�%�3�3�K�K�M�%�2�2�"�!�#���\��Os�4$E�:$E#c�~���fd�}�j|�j�j�j��_y)Nc����j�}|j�}|jt�t	�j
�j|�}tj}tj}d}|j�j�jj�||||�|j|�y�Nr)r�r>r|r�samlogon_logon_infor3r�r�$NetlogonNetworkTransitiveInformation�NetlogonValidationSamInfo4�netr_LogonSamLogonExrSr~�get_workstation)r0r��	old_state�logon�logon_level�validation_level�
netr_flagsr-s       �r�connectz'packet_rpc_netlogon_39.<locals>.connectQs�����+�+�-���,�,�.�	�
� � �!2�3�#�G�N�N�$+�$8�$8�$)�+���C�C��#�>�>���
�	���w�~�~�&�4�4�D�D�F�*�$�/�)�	+�	� � ��+rT��with_random_bad_credentialsr=r}�last_samlogon_bad�r+r,r-r�s  ` r�packet_rpc_netlogon_39rOsC���,�.	�+�+�G�,3�,>�,>�,3�,B�,B�,3�,E�,E�	G���
rc�t�tj�}d|_tj�}tj|_||_tj�}tj|_||_tj�}tj|_|||g|_	t|�S)N�)r	�AV_PAIR_LISTr^�AV_PAIR�MsvAvNbComputerName�AvId�Value�MsvAvNbDomainName�MsvAvEOL�pairr
)�domain_name�
computer_name�target_info�computername�
domainname�eols      r�samlogon_targetros����&�&�(�K��K���?�?�$�L��3�3�L��&�L�����"�J��/�/�J�O�"�J��
�/�/�
�C����C�H�"�L�#�6�K���K� � rc���t||�}d}|jt||��}tj�}|D�cgc]}t|t�r|n
t|���!c}|_tj�|_
t|d�|j_|dD�cgc]}t|t�r|n
t|���!c}|j_
tj�|_|j!�\}}	|	|jj"_||jj&_|j)�|jj*_|Scc}wcc}w)Nsabcdefgh)r4�	challenger�nt_response)r�get_ntlm_responserr�netr_NetworkInfor�r�r�r�netr_ChallengeResponse�ntr�r�r��netr_IdentityInfo�
identity_info�get_ntlm_username_domainr�string�account_namer��workstation)
rrr0�target_info_blobr�responser�r�ror3s
          rr�r��s4��&�{�M�B���I��&�&�-A�1:�3C�'�E�H�
�%�%�'�E�HQ�R�1�
�1�c� 2�1��A��>�R�E�O�"�9�9�;�E�H��h�}�5�6�E�H�H�O�HP�Q^�H_�`�1�
�1�c� 2�1��A��>�`�E�H�H�M�"�4�4�6�E���8�8�:��X�v�.4�E���#�#�*�.6�E���$�$�+�.3�.C�.C�.E�E���#�#�*��L��S��as�$E+�($E0c��|j�}|j|jtjtj
ztjz�yrC)r��netr_DsrEnumerateDomainTrustsrSr�NETR_TRUST_FLAG_IN_FOREST�NETR_TRUST_FLAG_OUTBOUND�NETR_TRUST_FLAG_INBOUND�r+r,r-r�s    r�packet_rpc_netlogon_40r*�sO���'�'�)�A��#�#�����*�*��)�)�	*��(�(�	)�*�
rc�~���fd�}�j|�j�j�j��_y)Nc
����	j�}�	j�\}}|j�}|jt�t�	j�	j|�}tj}tj}d}|j�	j�	jj�||||||�|j|�yr�)r�r�r>r|rr�r3r�rr�r��netr_LogonSamLogonWithFlagsrSr~r�)
r0r�r�r�r�r�r�r�r�r-s
         �rr�z'packet_rpc_netlogon_45.<locals>.connect�s�����+�+�-���0�0�2���t��,�,�.�	�
� � �!2�3�#�G�N�N�$+�$8�$8�$)�+���C�C��#�>�>���
�	�%�%�g�n�n�&-�&;�&;�&K�&K�&M�&*�&*�&1�&+�&6�&0�	2�	� � ��+rTr�rs  ` r�packet_rpc_netlogon_45r.�sC���,�4	�+�+�G�,3�,>�,>�,3�,B�,B�,3�,E�,E�	G���
rc�D�|j�}|j�yrC��get_samr_context�
get_handler)s    r�
packet_samr_0r3����� � �"�A��L�L�N�rc���|j�}|j�}|j�#|j|j�d|_y|j�#|j|j�d|_y|j
�*|j|j
�d|_d|_y|j�)|j|j�d|_d|_yrC)	r1�get_connection�user_handle�Close�group_handle�
domain_handle�ridsrbr��r+r,r-r��ss     r�
packet_samr_1r>�s���� � �"�A�	����A�	�}�}� �	����
�
����
��
���	#�	�����������
���	$�	������ �������
�	
���	�	�������������rc��|j�}|j�}|j�
t|||�|j	|jd�y�NrQT)r1r6r7�packet_samr_34�
QuerySecurityr<s     r�
packet_samr_3rC�sI��� � �"�A�	����A��}�}���v�|�W�5��O�O�A�M�M�1�%�rc���|j�}|j�}|j�}tj�}|j
|_|j||�|_yrC)	r1r6r2rr�r3r�LookupDomainr�)r+r,r-r�r=�h�ds       r�
packet_samr_5rH�sT��� � �"�A�	����A�	����A��
�
��A��~�~�A�H��>�>�!�Q�'�A�L�rc��|j�}|j�}|j�}|j|dd�y�NrT)r1r6r2�EnumDomains�r+r,r-r�r=rFs      r�
packet_samr_6rM�s<��� � �"�A�	����A�	����A��M�M�!�Q���rc��|j�}|j�}|j�}|j�
t	|||�|j|tj|j�|_yrC)	r1r6r2r�rH�
OpenDomainrr�r:rLs      r�
packet_samr_7rPsf��� � �"�A�	����A�	����A��|�|���f�l�G�4��l�l�1�#+�#D�#D�#$�<�<�1�A�O�r��c���|j�}|j�}|j�
t|||�t	j
t�}|j|j|�yrC)r1r6r:rPrXrY�SAMR_QUERY_DOMAIN_INFO_LEVELS�QueryDomainInfo�r+r,r-r�r=rss      r�
packet_samr_8rWsZ��� � �"�A�	����A������f�l�G�4��M�M�7�8�E����a�o�o�u�-�rc��|j�}|j�}|j�
t|||�|j	|jdd�y)N�drT)r1r6r:rP�EnumDomainAliasesr<s     r�packet_samr_15r['sM��� � �"�A�	����A������f�l�G�4��������a�0�rc�0�|j�}|j�}|j�
t|||�t	j
�}t	j�}|j|_|g|_	|j|j|�yrC)r1r6r:rPrr�r�r�r�r��GetAliasMembership)r+r,r-r�r=r�r�s       r�packet_samr_16r^2su��� � �"�A�	����A������f�l�G�4��<�<�>�D��:�:�<�C��l�l�C�G���D�I�������$�/�rc��|j�}|j�}|j�
t|||�t	j
|j�}|j|j|g�|_yrC)	r1r6r:rPrr�ror�r;)r+r,r-r�r=rHs      r�packet_samr_17r`Asc��� � �"�A�	����A������f�l�G�4��:�:�g�&�&�'�D�
�]�]�1�?�?�T�F�
3�A�F�rc��|j�}|j�}|j�
t|||�g}|jD]$}|jD]}|j|���&|j
|j|�yrC)r1r6r;r`�ids�append�
LookupRidsr:)r+r,r-r�r=r;�r�is        r�packet_samr_18rgMs���� � �"�A�	����A��v�v�~��v�|�W�5�
�D�
�V�V������	�A��K�K��N�	���L�L����$�'�rc���|j�}|j�}|j�
t|||�d}|j	|jt
j|�|_y)NiT)r1r6r:rP�	OpenGrouprr�r9)r+r,r-r�r=�rids      r�packet_samr_19rk[s`��� � �"�A�	����A������f�l�G�4�
�C��[�[����!)�!B�!B�!$�&�A�N�rc��|j�}|j�}|j�
t|||�|j	|j�yrC)r1r6r9rk�QueryGroupMemberr<s     r�packet_samr_25rnisI��� � �"�A�	����A��~�~���v�|�W�5����q�~�~�&�rc�
�|j�}|j�}|j�
t|||�|j	|j
tj|jdjd�|_	yrJ)
r1r6r;r`�OpenUserr:rr�rbr7r<s     rrArAssk��� � �"�A�	����A��v�v�~��v�|�W�5��J�J�q���'�@�@� �v�v�a�y�}�}�Q�/�1�A�M�rc��|j�}|j�}|j�
t|||�d}|j	|j|�yr@)r1r6r7rA�
QueryUserInforVs      r�packet_samr_36rssN��� � �"�A�	����A��}�}���v�|�W�5�
�E��O�O�A�M�M�5�)�rc��|j�}|j�}|j�
t|||�|j	|j�yrC)r1r6r7rA�GetGroupsForUserr<s     r�packet_samr_39rv�sI��� � �"�A�	����A��}�}���v�|�W�5����q�}�}�%�rc�D�|j�}|j�yrCr0r)s    r�packet_samr_57rx�r4rc�D�|j�}|j�yrCr0r)s    r�packet_samr_64rz�r4rc�p�|j�}d|jz}d}d}|j|||�y)N�\\zIPC$rQT)�get_srvsvc_connectionrS�NetShareGetInfo)r+r,r-r=�
server_unc�
share_namerss       r�packet_srvsvc_16r��s=���%�%�'�A��'�.�.�(�J��J�
�E����j�*�e�4�rc�j�|j�}d|jz}d}|j||�y)a*NetSrvGetInfo

    FIXME: Level changed from 102 to 101 here, to bypass Windows error.

    Level 102 will cause WERR_ACCESS_DENIED error against Windows, because:

        > If the level is 102 or 502, the Windows implementation checks whether
        > the caller is a member of one of the groups previously mentioned or
        > is a member of the Power Users local group.

    It passed against Samba since this check is not implemented by Samba yet.

    refer to:

        https://msdn.microsoft.com/en-us/library/cc247297.aspx#Appendix_A_80

    r|�eT)r}rS�
NetSrvGetInfo)r+r,r-�srvsvcrrss      r�packet_srvsvc_21r��s8��$�
*�
*�
,�F��'�.�.�(�J��E�
����U�+�r)�r�rrX�	samba.netr�samba.dcerpcrrrrrr	�samba.dcerpc.netlogonr
�samba.dcerpc.securityr�
samba.netbiosr�	samba.ndrr
�samba.credentialsrrr�sambar�samba.ntstatusrr�dns.resolverrE�ldbrrr"� DRSUAPI_DS_NAME_FORMAT_FQDN_1779�"DRSUAPI_DS_NAME_FORMAT_NT4_ACCOUNT�DRSUAPI_DS_NAME_FORMAT_DISPLAY�DRSUAPI_DS_NAME_FORMAT_GUID� DRSUAPI_DS_NAME_FORMAT_CANONICAL�%DRSUAPI_DS_NAME_FORMAT_USER_PRINCIPAL�#DRSUAPI_DS_NAME_FORMAT_CANONICAL_EX�(DRSUAPI_DS_NAME_FORMAT_SERVICE_PRINCIPAL�)DRSUAPI_DS_NAME_FORMAT_SID_OR_SID_HISTORY�!DRSUAPI_DS_NAME_FORMAT_DNS_DOMAIN�'DRSUAPI_DS_NAME_FORMAT_UPN_AND_ALTSECID�6DRSUAPI_DS_NAME_FORMAT_NT4_ACCOUNT_NAME_SANS_DOMAIN_EX�2DRSUAPI_DS_NAME_FORMAT_LIST_GLOBAL_CATALOG_SERVERS�$DRSUAPI_DS_NAME_FORMAT_UPN_FOR_LOGON�4DRSUAPI_DS_NAME_FORMAT_LIST_SERVERS_WITH_DCS_IN_SITE�&DRSUAPI_DS_NAME_FORMAT_STRING_SID_NAME�3DRSUAPI_DS_NAME_FORMAT_ALT_SECURITY_IDENTITIES_NAME�DRSUAPI_DS_NAME_FORMAT_LIST_NCS�#DRSUAPI_DS_NAME_FORMAT_LIST_DOMAINS�&DRSUAPI_DS_NAME_FORMAT_MAP_SCHEMA_GUID�3DRSUAPI_DS_NAME_FORMAT_NT4_ACCOUNT_NAME_SANS_DOMAIN�!DRSUAPI_DS_NAME_FORMAT_LIST_ROLES�+DRSUAPI_DS_NAME_FORMAT_LIST_INFO_FOR_SERVER�6DRSUAPI_DS_NAME_FORMAT_LIST_SERVERS_FOR_DOMAIN_IN_SITE�+DRSUAPI_DS_NAME_FORMAT_LIST_DOMAINS_IN_SITE�+DRSUAPI_DS_NAME_FORMAT_LIST_SERVERS_IN_SITE�!DRSUAPI_DS_NAME_FORMAT_LIST_SITESrZr&r.r;�packet_cldap_5�packet_dcerpc_0�packet_dcerpc_2�packet_dcerpc_3�packet_dcerpc_11�packet_dcerpc_12�packet_dcerpc_13�packet_dcerpc_14r?rArJ�packet_dns_1rM�dir�getattr�NAME_FORMATSrfrurz�packet_drsuapi_2�packet_drsuapi_3�packet_drsuapi_4�packet_epm_3r��packet_ldap_r��
packet_ldap_1r�r��
packet_ldap_4�
packet_ldap_5�
packet_ldap_6�
packet_ldap_7�
packet_ldap_8�
packet_ldap_9�packet_ldap_16�packet_lsarpc_0�packet_lsarpc_1�packet_lsarpc_2�packet_lsarpc_3�packet_lsarpc_4�packet_lsarpc_5�packet_lsarpc_6r�r�r��packet_lsarpc_40�packet_lsarpc_43�packet_lsarpc_44�packet_lsarpc_68r�r�r��
packet_nbns_1�packet_rpc_netlogon_0�packet_rpc_netlogon_1�packet_rpc_netlogon_4�packet_rpc_netlogon_14�packet_rpc_netlogon_15�packet_rpc_netlogon_21�packet_rpc_netlogon_26r�r��packet_rpc_netlogon_34rrr�r*r.r3r>rCrHrMrPrTrW�packet_samr_14r[r^r`rgrkrnrArs�packet_samr_37rv�packet_samr_40�packet_samr_44rxrz�packet_samr_68r�r�)�_xs0r�<module>r�s���$
�
�
��G�G�=�)�����
 ��
���$���,�,��.�.��*�*��'�'��,�,��1�1��/�/��4�4��5�5��-�-��3�3��B�B��>�>��0�0��@�@��2�2��?�?��+�+��/�/��2�2��?�?��-�-��7�7��B�B��7�7��7�7��-�-�7��>@�T��������������
��
��
�����
�03�7�|�(�� �B�&����$�(���*��������
��
	���
��
�
��.�
�
�
��
��
��
��
������������������"�.�2��
�������&���
�
$��#��#��
%��$��$��%��
��4%���@!�$�6� �F��.����"#�B������
��	����	����������������(s�J#

Zerion Mini Shell 1.0