Skip to content

Commit 3ce41be

Browse files
authoredNov 20, 2024
docs(smbexec): update doc dead link (fortra#1850)
* Update the blog link to web.archive.org
1 parent 835e175 commit 3ce41be

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed
 

‎ChangeLog.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -722,7 +722,7 @@ As always, thanks a lot to all these contributors that make this library better
722722
UUIDs used and that information is included as well. This could be helpful when reading a portmap output and to
723723
develop new functionality to interact against a target interface.
724724
* `smbexec.py`: Another alternative to psexec. Less capabilities but might work on tight AV environments. Based on the
725-
technique described at https://www.optiv.com/blog/owning-computers-without-shell-access. It also
725+
technique described at https://web.archive.org/web/20190515131124/https://www.optiv.com/blog/owning-computers-without-shell-access. It also
726726
supports instantiating a local smbserver to receive the output of the commandos executed for those situations
727727
where no share is available on the other end.
728728
* `smbrelayx.py`: It now also listens on port 80 and forwards/reflects the credentials accordingly.

‎examples/smbexec.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
#
1212
# Description:
1313
# A similar approach to psexec w/o using RemComSvc. The technique is described here
14-
# https://www.optiv.com/blog/owning-computers-without-shell-access
14+
# https://web.archive.org/web/20190515131124/https://www.optiv.com/blog/owning-computers-without-shell-access
1515
# Our implementation goes one step further, instantiating a local smbserver to receive the
1616
# output of the commands. This is useful in the situation where the target machine does NOT
1717
# have a writeable share available.

0 commit comments

Comments
 (0)