fingerprint RT

This commit is contained in:
zerosum0x0
2018-03-29 15:33:54 -06:00
parent 20301cc5a9
commit 8576e0e798

View File

@@ -797,7 +797,7 @@ def exploit(target, pipe_name):
if server_os.startswith("Windows 7 ") or server_os.startswith("Windows Server 2008 R2"): if server_os.startswith("Windows 7 ") or server_os.startswith("Windows Server 2008 R2"):
info['os'] = 'WIN7' info['os'] = 'WIN7'
info['method'] = exploit_matched_pairs info['method'] = exploit_matched_pairs
elif server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ") or server_os.startswith("Windows Server 2016 ") or server_os.startswith("Windows 10"): elif server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ") or server_os.startswith("Windows Server 2016 ") or server_os.startswith("Windows 10") or server_os.startswith("Windows RT 9200"):
info['os'] = 'WIN8' info['os'] = 'WIN8'
info['method'] = exploit_matched_pairs info['method'] = exploit_matched_pairs
elif server_os.startswith("Windows Server (R) 2008") or server_os.startswith('Windows Vista'): elif server_os.startswith("Windows Server (R) 2008") or server_os.startswith('Windows Vista'):