Exploits windows 8/10/2016 using MS17-010 vulnerability | Metasploit + Unicorn | Bypass AV

18
10



Exploit MS17-010 vulnerability on windows 8.1/10/2016 using Metasploit + Unicorn | Bypass Antivirus | Unicorn | Kali Linux 2018
—————————————————————————————————————————————————————
WARNING:
► THIS VIDEO IS FOR EDUCATIONAL PURPOSE, TO BE KNOW AND AT LEAST YOU CAN PREVENT IT, THIS IS JUST TO DETECT VULNERABILITY, DO NOT USE FOR ILLEGAL PURPOSE.
—————————————————————————————————————————————————————
Windows 7/8.1/2008 R2/2012 R2/2016 R2 – ‘EternalBlue’ SMB Remote Code Execution (MS17-010)

Download ::
Exploit-DB :
Mysmb.py :
Unicorn :
MS17-010 :

PART 2 :

Thanks For Watching……….!

Nguồn: https://fliptrazon.com

Xem thêm bài viết khác: https://fliptrazon.com/cong-nghe/

18 COMMENTS

  1. # python windows.py 192.168.x.x netlogon
    Traceback (most recent call last):
    File "windows.py", line 998, in <module>
    exploit(target, pipe_name)
    File "windows.py", line 796, in exploit
    conn.login(USERNAME, PASSWORD, maxBufferSize=4356)
    File "/root/Desktop/exploit/mysmb.py", line 152, in login
    smb.SMB.login(self, user, password, domain, lmhash, nthash, ntlm_fallback)
    File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 3374, in login
    self.login_extended(user, password, domain, lmhash, nthash, use_ntlmv2 = True)
    File "/root/Desktop/exploit/mysmb.py", line 160, in login_extended
    smb.SMB.login_extended(self, user, password, domain, lmhash, nthash, use_ntlmv2)
    File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 3311, in login_extended
    if smb.isValidAnswer(SMB.SMB_COM_SESSION_SETUP_ANDX):
    File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 717, in isValidAnswer
    raise SessionError, ("SMB Library Error", self['ErrorClass'] + (self['_reserved'] << 8), self['ErrorCode'], self['Flags2'] & SMB.FLAGS2_NT_STATUS, self)
    impacket.smb.SessionError: SMB SessionError: STATUS_LOGON_FAILURE(The attempted logon is invalid. This is either due to a bad username or authentication information.)

  2. Don`t work python windows.py 192.168.x.xxx netlogon
    Traceback (most recent call last):
    File "windows.py", line 2, in <module>
    from impacket import smb, smbconnection
    File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 49, in <module>
    from pyasn1.type.univ import noValue
    ImportError: cannot import name noValue

  3. HI it awesome but at create the txt file with unicorn the output is:

    Happy Magic Unicorns.
    [*] Note that AMSI_BYPASS is currently set to 'ON' which incorporates an AMSI Bypass technique that is large in nature.
    [*] Windows command prompt has a character restriction of 8191 which if you are using cmd.exe as a payload delivery option, this will not work.
    [*] Turn off AMSI_BYPASS=ON in the unicorn.py file located at the very top to turn this feature off which is ON by default.
    [*] If you are calling PowerShell directly, this isn't a concern.
    [!] WARNING. WARNING. Length of the payload is above command line limit length of 8191. Recommend trying to generate again or the line will be cut off.
    [!] Total Payload Length Size: 27070

    How to fix that. Thanks!

  4. Webcam_snap,all webcam cmnds and screenshots are not working on my windows10 metasploit frame work plz help meee

  5. Is it necessary to have a loophole eternalblue in order to penetrate it ??
    Or is it something else other than Eternalblue ?
    Sorry For My englais 😊😊

  6. this is good video. but how can i learn victim username and password ? you are writing username pentest. how we will learn it ?

LEAVE A REPLY

Please enter your comment!
Please enter your name here