fingerprint RT
This commit is contained in:
@@ -797,7 +797,7 @@ def exploit(target, pipe_name):
|
|||||||
if server_os.startswith("Windows 7 ") or server_os.startswith("Windows Server 2008 R2"):
|
if server_os.startswith("Windows 7 ") or server_os.startswith("Windows Server 2008 R2"):
|
||||||
info['os'] = 'WIN7'
|
info['os'] = 'WIN7'
|
||||||
info['method'] = exploit_matched_pairs
|
info['method'] = exploit_matched_pairs
|
||||||
elif server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ") or server_os.startswith("Windows Server 2016 ") or server_os.startswith("Windows 10"):
|
elif server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ") or server_os.startswith("Windows Server 2016 ") or server_os.startswith("Windows 10") or server_os.startswith("Windows RT 9200"):
|
||||||
info['os'] = 'WIN8'
|
info['os'] = 'WIN8'
|
||||||
info['method'] = exploit_matched_pairs
|
info['method'] = exploit_matched_pairs
|
||||||
elif server_os.startswith("Windows Server (R) 2008") or server_os.startswith('Windows Vista'):
|
elif server_os.startswith("Windows Server (R) 2008") or server_os.startswith('Windows Vista'):
|
||||||
|
|||||||
Reference in New Issue
Block a user