Telefonica / Eternalblue-Doublepulsar-Metasploit

Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.
GNU Lesser General Public License v2.1
1.09k stars 520 forks source link

Error set payload #57

Open holdon1996 opened 7 years ago

holdon1996 commented 7 years ago

When I set payload windows/x64/meterpreter/bind_tcp error : This value specified for payload is not valid . And when I set payload windows/meterpreter/bind_tcp -> It's OK but not run ( Error getting output...) Windows Victim is 7 Pro(x64)

zuhan1990 commented 7 years ago

isnt bind_tcp should be done in background??

Geistlehre commented 6 years ago

i've got the same here and plus :

msf auxiliary(scanner/smb/smb_ms17_010) > exploit

[+] 192.168.1.28:445 - Host is likely VULNERABLE to MS17-010! - Windows 8.1 Pro 9600 x64 (64-bit) [] Scanned 1 of 1 hosts (100% complete) [] Auxiliary module execution completed

but when a use the eternelblue exploit and show options i've just :

Exploit target:

Id Name


8 Windows 7 (all services pack) (x86) (x64)

No windows 8....

zuhan1990 commented 6 years ago

Change it to explorer.exe and try changing architecture too or maybe it's antivirus.