Skip to content

Commit

Permalink
comment out service_exec
Browse files Browse the repository at this point in the history
  • Loading branch information
zerosum0x0 committed Jan 30, 2018
1 parent 8bd6f37 commit f611d0e
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion zzz_exploit.py
Original file line number Diff line number Diff line change
Expand Up @@ -967,7 +967,7 @@ def smb_pwn(conn, arch):
smbConn.disconnectTree(tid2)

#smb_send_file(smbConn, sys.argv[0], 'C', '/exploit.py')
service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt')
#service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt')
# Note: there are many methods to get shell over SMB admin session
# a simple method to get shell (but easily to be detected by AV) is
# executing binary generated by "msfvenom -f exe-service ..."
Expand Down

0 comments on commit f611d0e

Please sign in to comment.