Manual MS08-067 Issue

Thanks Fella, this worked perfectly. Appreciated! @Veilios said:

hi guys, not sure if it’ll help months later, but I created a modified version of the MS08-067 exploit that is a little more flexible. It has logic to address differing payload lengths and also allows attempts on port 139 over NetBIOS sessions, something the Metasploit ruby code seems to handle well but I hadn’t seen it implemented in Python.

If direct exploitation with Metasploit isn’t working this probably won’t work either, but it’s worth a shot.

Anyways, here it is:
GitHub - andyacer/ms08_067: Updating MS08-067 Python exploit script