3ndG4me / AutoBlue-MS17-010

This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
MIT License
1.19k stars 311 forks source link

Running the listener on a separate host #35

Closed bcnx closed 1 year ago

bcnx commented 2 years ago

Hi,

I'm doing my pentesting via a locally installed Pi that offers an OpenVPN connection for me. The Pi is in the LAN of the client and I use that in combination with a Kali install that connects via VPN.

I don't think I can compile the shellcode on the Pi, so I ded that on Kali. I cannot start the listener on Kali however,, because it has no IP on the client's LAN. It has a TUN interface in another range.

Can the code be changed so I can use a listener on another host?

Cheers,

BC

bcnx commented 2 years ago

Hey, I compiled on a x64 host and copied everything over to the Pi and I was able to run both Python scripts. I do get this though: good response status: INVALID_PARAMETER

Is that something that can be helped?

Chers,

BC

3ndG4me commented 1 year ago

Hey, this isn't really relevant to this repository. This question is about exploitation guidance and setup and not about any bug in the code itself.

To answer your question however: It should be as simple as specifying your listening hosts IP when you generate the payloads. Then on your listening host, start up metasploit and launch the multi handlers manually. I do this all the time if I need to egress out of an environment for any reason. If it is not working I would advise it's likely a networking issue or an issue on your listening host. That is all I can do to advise however, good luck!