-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ive created a helper script and simplified compilation process #22
Comments
ljrk0
pushed a commit
to ljrk0/MS17-010
that referenced
this issue
Mar 3, 2023
…dated the examples. (worawit#22) * Force byte literals where required and corrected the string.ascii_letters(). Also corrected the spacing to conform to the Python style guide (4 spaces and not tabs). * Force byte literals where required and removed all trailing whitespace. Added service_exec() from https://www.exploit-db.com/exploits/42315 and updated the examples in do_system_mysmb_session(). Confirmed to successfully exploit Windows XP. * Uncomment the RemoteShell() as it is confirmed to work by the upstream author.
ljrk0
pushed a commit
to ljrk0/MS17-010
that referenced
this issue
Mar 3, 2023
…dated the examples. (worawit#22) * Force byte literals where required and corrected the string.ascii_letters(). Also corrected the spacing to conform to the Python style guide (4 spaces and not tabs). * Force byte literals where required and removed all trailing whitespace. Added service_exec() from https://www.exploit-db.com/exploits/42315 and updated the examples in do_system_mysmb_session(). Confirmed to successfully exploit Windows XP. * Uncomment the RemoteShell() as it is confirmed to work by the upstream author.
ljrk0
pushed a commit
to ljrk0/MS17-010
that referenced
this issue
Mar 3, 2023
…dated the examples. (worawit#22) * Force byte literals where required and corrected the string.ascii_letters(). Also corrected the spacing to conform to the Python style guide (4 spaces and not tabs). * Force byte literals where required and removed all trailing whitespace. Added service_exec() from https://www.exploit-db.com/exploits/42315 and updated the examples in do_system_mysmb_session(). Confirmed to successfully exploit Windows XP. * Uncomment the RemoteShell() as it is confirmed to work by the upstream author.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi All,
Not sure if your interested.. really like this exploit so ive simplified the build... more so geared towards windows 7 but easily ported to use the other scripts..
https://github.com/REPTILEHAUS/Eternal-Blue
The text was updated successfully, but these errors were encountered: