Skip to content

Latest commit

 

History

History
30 lines (20 loc) · 1.1 KB

README.md

File metadata and controls

30 lines (20 loc) · 1.1 KB

Radius-Python-Sanity-Check

This is a core set of scripts to verify a MS based Radius server is responding and to authentication/authorisation requests. MS Windows will report the service as running, however it could have many errors returned, and an actual authentication problem be present.

Version

1.0

Tech

Lots of hacky stuff from Java, MS to get MSCHAPv2 objects / auth working

  • [check_radius.py] - Core script called by the executors, relies on mschapv2.py and lib/ lib/dicts
  • [mschapv2.py] - MSCHAPv2 Handler
  • [zabbix_executor.sh] - Zabbix External Script
  • [lvs_executor.sh] - RHEL LVS Script to feed into IPVSADM/LVS

Installation

You need Python 2.7

$ coming soon

Usage

./check_radius.py --username 'your_username' --password 'said_users_password' --port 'your_radius_port' --host 'raidus_host_or_balancer' --secret 'your_radius_secret'

LVS and Zabbix shell scripts to run the above and input pre-configred details.

Credit and Notes

Credit to Lee Webb for the initial script and finding the Java Reverse Engineering sections for MSCHAP.