3ndG4me / AutoBlue-MS17-010

This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
MIT License
1.15k stars 305 forks source link

zzz_exploit.py - enable smb copy of file and execute. #24

Closed Pr1vEsc closed 3 years ago

Pr1vEsc commented 3 years ago

I would like to enable this in the file instead of the shell smbConn = conn.get_smbconnection() smb_send_file(smbConn, 'shell.exe', 'C', '/test.exe') service_exec(conn, r'c:\test.exe')

Is this possible because I am testing with a WinXP host and scripts do not work against that machine.

3ndG4me commented 3 years ago

In theory any function supported by SMB/the smb library in this project is "possible" to use against targets. Your compatibility may vary based on your target's architecture and feature support, but as long as both sides support it then it should work.

That said, I don't maintain or support anything beyond the baseline functionality. I am happy to take PRs for enhancements that enable such features, but the primary focus of this variant of the public exploit code is to just maintain a stable proof of concept for getting remote code execution. This is not intended to be an all encompassing "eternal blue exploit framework" so incidentally it will be pretty bare bones unless further contributions are made. At this time I do not intend to add any further features on my own outside of general maintenance and support for the baseline functionality.

Anything extra is up to the user of the scripts. If you'd like it to be more officially supported then I would recommend doing the research to get the feature working yourself and submitting a PR.