Closed Anon-Exploiter closed 4 years ago
$ ruby --version
ruby 2.7.1p83 (2020-03-31 revision a0c7c23c9c) [x86_64-linux-gnu]
I can't reproduce this:
msf5 > search eternalblue
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 auxiliary/admin/smb/ms17_010_command 2017-03-14 normal No MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Command Execution
1 auxiliary/scanner/smb/smb_ms17_010 normal No MS17-010 SMB RCE Detection
2 exploit/windows/smb/ms17_010_eternalblue 2017-03-14 average Yes MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
3 exploit/windows/smb/ms17_010_eternalblue_win8 2017-03-14 average No MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption for Win8+
4 exploit/windows/smb/ms17_010_psexec 2017-03-14 normal Yes MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
5 exploit/windows/smb/smb_doublepulsar_rce 2017-04-14 great Yes SMB DOUBLEPULSAR Remote Code Execution
Interact with a module by name or index, for example use 5 or use exploit/windows/smb/smb_doublepulsar_rce
msf5 > use exploit/windows/smb/ms17_010_eternalblue_win8
[*] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
msf5 exploit(windows/smb/ms17_010_eternalblue_win8) >
My guess is we have different versions of python. Perhaps you can try something like this: https://github.com/rapid7/metasploit-framework/compare/master...timwr:fix_13825
Dupe of #13344 ~which is a dupe of #13478~
Sorry for creating a dupe.
So the solution if anyone comes across this issue is to replace python3 with python2 in the shebang in the python exploit.
The following one-liner will do:
sed -i 's/python3/python2/g' /usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue_win8.py
POC:
Relooking at it again, changing python3 to python2 does fix it but while running the exploit impacket
isn't loaded with python2
which is required for the exploit to run.
The initial error was:
I can't find a solution to this, for fixing it for python3, we've to replace each instance of '\x00'
with b'\x00'
. Is that the intended solution? Please correct me if I'm wrong.
Replacing those instances does fix it but it isn't a good fix, there might be other errors too if ran against a legit target.
I can't find a solution to this, for fixing it for python3, we've to replace each instance of '\x00' with b'\x00'. Is that the intended solution? Please correct me if I'm wrong.
Replacing those instances does fix it but it isn't a good fix, there might be other errors too if ran against a legit target.
There is currently no official solution. Note that replacing '\x00' with b'\x00' is unlikely to be sufficient. Refer to #13478.
Thanks @bcoles, I'll see if I can fix the exploit in my free time with proper implementation and against a target as written by @acammack-r7 in the issue.
Again, thanks for the support guys, closing this.
Hello everyone! I made a simple change that works.
In the first line, replace this:
for this:
And the metasploit can load it now!
Hello everyone! I made a simple change that works.
In the first line, replace this:
!/usr/bin/env python3
for this:
!/usr/bin/env python
And the metasploit can load it now
what did you edit?
Hello everyone! I made a simple change that works. In the first line, replace this:
!/usr/bin/env python3
for this:
!/usr/bin/env python
And the metasploit can load it now
what did you edit?
nano metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue_win8.py
Hello everyone! I made a simple change that works. In the first line, replace this:
!/usr/bin/env python3
for this:
!/usr/bin/env python
And the metasploit can load it now
what did you edit?
nano metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue_win8.py
nano modules/exploits/windows/smb/ms17_010_eternalblue_win8.py Does solve the problem ! but now it says IMPACKET is missing, however it is installed, any clue ? ps: Iam on msf6 > version Framework: 6.0.15-dev Console : 6.0.15-de
In a fresh tab type "pip install impacket", Then I got the error "Target not vulnerable for this exploit", I switched from the eternalblue_win8 to the one without win8 👍
@alexmello3 thank you, your comment worked!
Steps to reproduce
search eternalblue
use exploit/windows/smb/ms17_010_eternalblue_win8
The exploit shows up in search but while including it doesn't work. Sounds dumb but I think the exploit is either broken or wasn't included in the version I'm using.
Expected behavior
The exploit should show up in tab completion and should be loaded.
Current behavior
The exploit doesn't load and shows the following error:
[-] Failed to load module: exploit/windows/smb/ms17_010_eternalblue_win8
Here's tail of
~/.msf4/logs/framework.log
(probably the exploit is broken)System stuff
Metasploit version
I installed Metasploit with:
OS
What OS are you running Metasploit on?