Bug#1067093: Impacket Patches for PR 1714 and 1715

2024-03-28 Thread Arszilla






Arslan M.

CRTO, GWAPT, OSCP

Hi again,

#1721 has been merged. Can the impacket package be updated to the latest state 
of the repository to allow the Kali Team and me to package NetExec?

Thanks!

On Friday, March 22nd, 2024 at 10:42, Arszilla  wrote:

> A small status update:
> - https://github.com/fortra/impacket/pull/1714 has been merged, thus any 
> patch related to this is now redundant.
> - https://github.com/fortra/impacket/pull/1715 has been redirected to 
> https://github.com/fortra/impacket/pull/1721 which is pending approval.
> 
> As a result, once #1721 is merged, I'll be updating this ticket again to ask 
> you to update the impacket's package instead of applying patches.
> 
> Kind regards.



Bug#1067093: Impacket Patches for PR 1714 and 1715

2024-03-22 Thread Arszilla
A small status update:
- https://github.com/fortra/impacket/pull/1714 has been merged, thus any patch 
related to this is now redundant.
- https://github.com/fortra/impacket/pull/1715 has been redirected to 
https://github.com/fortra/impacket/pull/1721 which is pending approval.

As a result, once #1721 is merged, I'll be updating this ticket again to ask 
you to update the impacket's package instead of applying patches.

Kind regards.



Bug#1067093: Impacket Patches for PR 1714 and 1715

2024-03-18 Thread Arszilla
Package: impacket
Version: 0.11.0-2

Hi there,

Currently, I am helping the Kali Team to package NetExec 
(https://github.com/Pennyw0rth/NetExec) as per 
https://bugs.kali.org/view.php?id=8533. NetExec (nxc/netexec) is a fork of 
crackmapexec (which has been discontinued) and is still in active development. 
Sadly, packaging netexec is not simple as it requires me to solve several 
dependency issues, one of which is impacket/python3-impacket.

Currently, NetExec is using a fork of Fortra/SecureAuthCorp's impacket, which 
was created due to several functionality-breaking changes that were implemented 
by Fortra without regard to how they might impact the users of their library.

I have discussed the situation with some maintainers of NetExec, explaining the 
choices I have regarding facilitating the packaging of their tool as a mere 
volunteer/contributor. After discussions and research that lasted days, it was 
concluded that there are two options available:
1. Submit PRs to Fortra and hope the changes they introduced are reverted, 
alongside the additions that the netexec devs have made. The netexec devs have 
submitted 2 PRs, https://github.com/fortra/impacket/pull/1714 and 
https://github.com/fortra/impacket/pull/1715. If these are approved by Fortra, 
the python3-impacket package would need to be updated subsequently with the 
changes so that packaging could continue.
2. Create a new package of the fork named python3-impacket-nxc, which would 
install the forked impacket library to 
/usr/lib/python3/dist-packages/impacket_nxc/ and proceed with packaging. 
However, since netexec maintainers want to be able to pull the changes from the 
mainstream with little-to-no manual intervention, a patch must be generated 
(which I did generate) that would replace all relevant instances of impacket 
(such as "from impacket import X") with impacket_nxc (to make sure the new 
package would be installed in a new path and unique namespace to avoid 
collisions). However, this patch is over 6700 lines and modifies ~260 files, 
thus even if it was split into multiple files, it might be a pain to maintain 
and update.

After discussing these 2 options, it was concluded that a 2nd impacket package 
might lead to confusion on both the maintainer (Kali Team/me) and the end-user 
sides; hence, the netexec maintainer submitting PRs to accommodate Option #1. 
However, Fortra is slow to respond to PR requests at times. As a result, I 
wanted to question the possibility of using patch files for the 2 MRs 
introduced by the netexec maintainers, allowing me to continue packaging 
netexec without the need for a second impacket package.

If this is acceptable on your end, I'd sincerely appreciate it if you could 
guide me through the process of providing you with the patch files, as I am 
fairly new to reporting these types of issues to the Debian side of things.

Kind regards.