Exploits windows 8/10/2016 using MS17-010 vulnerability | Metasploit + Unicorn | Bypass AV

Exploits windows 8/10/2016 using MS17-010 vulnerability | Metasploit + Unicorn | Bypass AV

Exploit MS17-010 vulnerability on windows 8.1/10/2016 using Metasploit + Unicorn | Bypass Antivirus | Unicorn | Kali Linux 2018 -------------------

[11.05.2017] GAM vs TSM [MSI 2017][Group Stage]
Cách Tải Movavi Video Editor Plus 2020 | Tải Và Crack #2
Free Download Windows Movie Maker Windows 10



Exploit MS17-010 vulnerability on windows 8.1/10/2016 using Metasploit + Unicorn | Bypass Antivirus | Unicorn | Kali Linux 2018
—————————————————————————————————————————————————————
WARNING:
► THIS VIDEO IS FOR EDUCATIONAL PURPOSE, TO BE KNOW AND AT LEAST YOU CAN PREVENT IT, THIS IS JUST TO DETECT VULNERABILITY, DO NOT USE FOR ILLEGAL PURPOSE.
—————————————————————————————————————————————————————
Windows 7/8.1/2008 R2/2012 R2/2016 R2 – ‘EternalBlue’ SMB Remote Code Execution (MS17-010)

Download ::
Exploit-DB :
Mysmb.py :
Unicorn :
MS17-010 :

PART 2 :

Thanks For Watching……….!

Nguồn: https://fliptrazon.com

Xem thêm bài viết khác: https://fliptrazon.com/cong-nghe/

COMMENTS

WORDPRESS: 18
  • comment-avatar

    For this exploit… Port 445 has to open in victim machine…

  • comment-avatar

    # python windows.py 192.168.x.x netlogon
    Traceback (most recent call last):
    File "windows.py", line 998, in <module>
    exploit(target, pipe_name)
    File "windows.py", line 796, in exploit
    conn.login(USERNAME, PASSWORD, maxBufferSize=4356)
    File "/root/Desktop/exploit/mysmb.py", line 152, in login
    smb.SMB.login(self, user, password, domain, lmhash, nthash, ntlm_fallback)
    File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 3374, in login
    self.login_extended(user, password, domain, lmhash, nthash, use_ntlmv2 = True)
    File "/root/Desktop/exploit/mysmb.py", line 160, in login_extended
    smb.SMB.login_extended(self, user, password, domain, lmhash, nthash, use_ntlmv2)
    File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 3311, in login_extended
    if smb.isValidAnswer(SMB.SMB_COM_SESSION_SETUP_ANDX):
    File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 717, in isValidAnswer
    raise SessionError, ("SMB Library Error", self['ErrorClass'] + (self['_reserved'] << 8), self['ErrorCode'], self['Flags2'] & SMB.FLAGS2_NT_STATUS, self)
    impacket.smb.SessionError: SMB SessionError: STATUS_LOGON_FAILURE(The attempted logon is invalid. This is either due to a bad username or authentication information.)

  • comment-avatar

    Don`t work python windows.py 192.168.x.xxx netlogon
    Traceback (most recent call last):
    File "windows.py", line 2, in <module>
    from impacket import smb, smbconnection
    File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 49, in <module>
    from pyasn1.type.univ import noValue
    ImportError: cannot import name noValue

  • comment-avatar

    so what if we didn't know the username and password?

  • comment-avatar

    how you enable name pipe on windows 8? :O

  • comment-avatar

    HI it awesome but at create the txt file with unicorn the output is:

    Happy Magic Unicorns.
    [*] Note that AMSI_BYPASS is currently set to 'ON' which incorporates an AMSI Bypass technique that is large in nature.
    [*] Windows command prompt has a character restriction of 8191 which if you are using cmd.exe as a payload delivery option, this will not work.
    [*] Turn off AMSI_BYPASS=ON in the unicorn.py file located at the very top to turn this feature off which is ON by default.
    [*] If you are calling PowerShell directly, this isn't a concern.
    [!] WARNING. WARNING. Length of the payload is above command line limit length of 8191. Recommend trying to generate again or the line will be cut off.
    [!] Total Payload Length Size: 27070

    How to fix that. Thanks!

  • comment-avatar

    moi 8.1 et pas vulnerable ???

  • comment-avatar

    Webcam_snap,all webcam cmnds and screenshots are not working on my windows10 metasploit frame work plz help meee

  • comment-avatar

    good vid man but need pass to 😛

  • comment-avatar

    Is it necessary to have a loophole eternalblue in order to penetrate it ??
    Or is it something else other than Eternalblue ?
    Sorry For My englais 😊😊

  • comment-avatar

    How i can get the username of the victim if i want to use that in WAN ?

  • comment-avatar
  • comment-avatar

    https://www.youtube.com/channel/UCnfHZmYvibnLkmbBoTMmxQQ?view_as=subscriber

  • comment-avatar

    this is good video. but how can i learn victim username and password ? you are writing username pentest. how we will learn it ?

  • comment-avatar

    That's great bro.

  • comment-avatar

    omg that's.. good

  • comment-avatar

    How i can update my msfconsol i have only 1699 exploit 🙁 ?

  • comment-avatar
  • DISQUS: 0