shadowbrokers-exploits/windows/Resources/Ops/PyScripts/lib/ops/data/ping.py
2017-04-14 11:45:07 +02:00

7 lines
No EOL
705 B
Python

from ops.data import OpsClass, OpsField, DszObject, DszCommandObject, cmd_definitions
import dsz
if ('ping' not in cmd_definitions):
dszping = OpsClass('response', {'elapsed': OpsField('elapsed', dsz.TYPE_INT), 'length': OpsField('length', dsz.TYPE_INT), 'ttl': OpsField('ttl', dsz.TYPE_INT), 'type': OpsField('type', dsz.TYPE_STRING), 'data': OpsClass('data', {'data': OpsField('data', dsz.TYPE_STRING)}, DszObject), 'fromaddr': OpsClass('fromaddr', {'addr': OpsField('addr', dsz.TYPE_STRING), 'type': OpsField('type', dsz.TYPE_STRING)}, DszObject)}, DszObject, single=False)
pingcommand = OpsClass('ping', {'response': dszping}, DszCommandObject)
cmd_definitions['ping'] = pingcommand