Automatic-Proxylogon-Exploit icon indicating copy to clipboard operation
Automatic-Proxylogon-Exploit copied to clipboard

line 286 and line 212

Open 13Ragna37 opened this issue 4 years ago • 0 comments

Hey Dude, awesome work but what do i wrong?

[] Target: https://mail.lab.local () Got FQDN: MAIL (+) Target is Vuln to SSRF [CVE-2021-26855]! () Getting Information Server (+) Computer Name = MAIL (+) Domain Name = mail.office.lab.local (+) Guest SID = S-1-5-18=rJqNiZqNgZKelpPRkJmZlpya0ZSXk9GNioHOxsvOxsbJx87Mgc3Pzc7Sz8fSz8mrzsrFzMrFys4= () Domain [or just Enter] = Traceback (most recent call last): File "auto-proxylogon.py", line 286, in exploit('https://'+sys.argv[1]) File "auto-proxylogon.py", line 212, in exploit X = input('(*)\033[1;32m Domain \033[1;37m[or just Enter] \033[1;0m= ') File "", line 0

^

SyntaxError: unexpected EOF while parsing

13Ragna37 avatar Aug 06 '21 15:08 13Ragna37