Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ive created a helper script and simplified compilation process #22

Open
REPTILEHAUS opened this issue Dec 22, 2017 · 0 comments
Open

Ive created a helper script and simplified compilation process #22

REPTILEHAUS opened this issue Dec 22, 2017 · 0 comments

Comments

@REPTILEHAUS
Copy link

Hi All,

Not sure if your interested.. really like this exploit so ive simplified the build... more so geared towards windows 7 but easily ported to use the other scripts..

https://github.com/REPTILEHAUS/Eternal-Blue

ljrk0 pushed a commit to ljrk0/MS17-010 that referenced this issue Mar 3, 2023
…dated the examples. (worawit#22)

* Force byte literals where required and corrected the string.ascii_letters(). Also corrected
the spacing to conform to the Python style guide (4 spaces and not tabs).

* Force byte literals where required and removed all trailing whitespace. Added
service_exec() from https://www.exploit-db.com/exploits/42315 and updated the
examples in do_system_mysmb_session(). Confirmed to successfully exploit
Windows XP.

* Uncomment the RemoteShell() as it is confirmed to work by the upstream author.
ljrk0 pushed a commit to ljrk0/MS17-010 that referenced this issue Mar 3, 2023
…dated the examples. (worawit#22)

* Force byte literals where required and corrected the string.ascii_letters(). Also corrected
the spacing to conform to the Python style guide (4 spaces and not tabs).

* Force byte literals where required and removed all trailing whitespace. Added
service_exec() from https://www.exploit-db.com/exploits/42315 and updated the
examples in do_system_mysmb_session(). Confirmed to successfully exploit
Windows XP.

* Uncomment the RemoteShell() as it is confirmed to work by the upstream author.
ljrk0 pushed a commit to ljrk0/MS17-010 that referenced this issue Mar 3, 2023
…dated the examples. (worawit#22)

* Force byte literals where required and corrected the string.ascii_letters(). Also corrected
the spacing to conform to the Python style guide (4 spaces and not tabs).

* Force byte literals where required and removed all trailing whitespace. Added
service_exec() from https://www.exploit-db.com/exploits/42315 and updated the
examples in do_system_mysmb_session(). Confirmed to successfully exploit
Windows XP.

* Uncomment the RemoteShell() as it is confirmed to work by the upstream author.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant