%FILENAME%
delldrac-0.1-2-any.pkg.tar.xz

%NAME%
delldrac

%VERSION%
0.1-2

%DESC%
Rid_enum is a null session RID cycle attack for brute forcing domain controllers.

%GROUPS%
archstrike
archstrike-scanners

%CSIZE%
5468

%ISIZE%
35840

%MD5SUM%
b19eca0da2bea2e0941c06169f13b85b

%SHA256SUM%
5f12d416ca21e5b48b51c2a710b115ca98549c231d52e82593e893c8589b91d8

%PGPSIG%
iQIzBAABCAAdFiEEddIvyekdD6dtYAcBaY2xzg1H6IsFAljV2ogACgkQaY2xzg1H6IuWVQ/9GkgvHBAbe5NK1MMuIOUJ+kgBptR7uEb0swm5hx2PBLae/8lhF5YCrtEP21fLWwxvDfM+E1KmurlKG1cdn/n3q/hXWKPJ87Vro/ikTg7Q517frCkO/TjF219VGNQ6H7J3Nxh8oOukrrWZhpIrl+jD/loGtfLTkSw7U/ybKgkrS5m3hYzH+W0hfCpNgNeqXul8ztpWZusMX+PNwkZZ7EBUz1xt9mhMWuqOz1Cf0a6e1pDaai7yLCXllU8M5HrtElG/beoHIIlbmxBGEYesxWOHZaBzkCMdnp+6BBQmpGIJIf2/FeZFpgNNGc8zfjfjtwTg8Jr1DSJAP2ArrVwi32mzWo2+seG0YVJin5SdSLyoNvfK/j+cRVmVipJ1R3eTQxSxTpCkFxJsypiWmRDYU9jCZUXE/knFCkHtxVkfjqBA5FBpHVelmpm8E8cJudVcrnyL5KsfPnEJFlkourKV6tCp0D1eVUg50FzJIV8lLDBQg0wGWtHU/INStZGSxIqy+JllQb+/PEwVIKk9q2uM6suFPOxX1djycE7CeFaXBHu30d2XGZdViLk1IV1xy94XRqH47Dgwf2lB4EumeE4ir5axXix8b8fKiHxowHmxbFvi+vnXDxKdKIsZooDPjZB+0lLZDSX3WiMSn72jGa4/DXV9LssfXawC2QLoBPKctMVPHio=

%URL%
https://www.trustedsec.com/september-2012/owning-dell-drac-awesome-hack/

%LICENSE%
custom

%ARCH%
any

%BUILDDATE%
1490410115

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%DEPENDS%
python2

