HackerSploit Damn that’s will be great but I wanna know ... Did you study Communication System/Engineering Or something similar to this fields Cuz a lot of people talk about it but they don’t know that SS7 is a protocol and it has an exploit in it which hard really to fix for multiple reasons main that’s we need to have a new sort of an Architecture
Eternalblue & Eternalchampion is otherwise known as a special exploit, next to all the normal exploits of the Equation Groups toolkit, and the doublepulsar is a payload. just so people know, who are a little bit confused about the two, also AWESOME video, helped me out 100% thumbs up for you mate :)
Hi, all your videos are very interesting. Just a remark , you talked to quickly. Don't forget that these videos are watching worldwide. Keep on sharing your knowledge buddy and god bless you.
Yeee still works 🤩🤩 The reason behind why your don't work is in 2021 you need to set a payload before you run , so set a payload called windows / arch (86x/64x ) / metepreter/reverse_tcp Then run ! Any other probs? Im free to clear for you . ask down below im there to help anytime 😃
Hello, for everybody who have a lot of errors and the exploit doesn't works : (Before you do "run" in the exploit in metasploit) : 1. Make sure that TARGETARCHITECTURE is set to your target architecture : x64 (64 bits) | x86 (32 bits) 2. The most important one : set DOUBLEPULSARPATH /root/.msf4/modules/exploits/windows/smb/deps/ set ETERNALBLUEPATH /root/.msf4/modules/exploits/windows/smb/deps/ # or set the path to the directory where you have the deps folder Hope it works :)
*Dudes important notice* :+ this Exploit will work only when the Doublepulsar1.3.1.exe already exists in the target system then It will scan it properly and print the message target infected and when exploiting, the file also must be (doublepulsar1.3.1.exe) already existed in the target system. Its all 'bout social engineering.............
We should add listening hosts and ports or not? or is it like it is necessary only when port forwarding is to be done, not needed if the target is in the same network as ours.
I tried to do it. But when im doing the scan, i only have that is complete but nothing else. Can you help me? i got: [*] Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed
i cant run the new double pulsar module, it says xan fine xml file on run time of double pulsar. i installed wine 32 as well as placed exploit in folder
Microsoft released a security update in jan,2019 for windows 7 which includes SMBv2. So, this exploit will only work on the machines who haven't installed that security update
it wont works on my lap i have tried a lot can you please figure it out always it shows 0027 error code i couldnt find the solution after showing LAUNCHING ETERNALBLUE...it shows PNP_ADDDEVICE ENNOT PARSE REPORT DISCRIPTOR and bla bla bla..at each line the 00277 error code fund i am learing by watching your videos bro...please help me
Attack using Eternal Blue does not work on Windows 10 and even on the Original Windows 7 users as long as the users always maintain their windows updates frequently cause Microsoft has released patches to stop this kind of attack from the eternal blue.
I got a question. Both when you scanned and you ran the EternalBlue exploit, it said that the target was already infected with DoublePulsar or that the backdoor was already installed. I suppose this is something you would have to install/infect the target with beforehand right? and if so, how would you go around doing that?
Hello my friend.... your videos do need some additional constructs.... 1... try using search 《then the exploit name 》this will search and bring up the exploit path on cli. ...and 2... you need to mention any mitigation strategies to protect against these types of exploits .....better video planning is needed ! 😎
Thanks man for this awesome tutorial,. i would really appreciate if you can upload a video regarding Wine32/64 because i face an issue exploiting the target due to i believe wine settings.
Ok i've been collecting too many ips this months I scanned almost 500 (deffrent countries) ips Every 499 only one is vuln.. And when i exploit connection refuse
Please does anyone know why my text file (.txt) document icon changes to a python icon in kali linux? When I checked properties of the text file, I see that it says kind: Python file(no console) 😞 My last two installations before I noticed this problems are: 1. Telefonica Eternal blue double pulsar (Github) 2. Veil Evasion I don’t know if any of this programs altered my text document files and changed the icons to python and the kind to python file (no console) instead of plain text document in kali linux
If you want to download and run this in a different directory like /opt other than /root you can use these commands: cd /opt/ git clone github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit cd /opt/Eternalblue-Doublepulsar-Metasploit/ cp eternalblue_doublepulsar.rb /usr/share/metasploit-framework/modules/exploits/windows/smb/ sed -i 's#root/Eternalblue-Doublepulsar-Metasploit/deps/#opt/Eternalblue-Doublepulsar-Metasploit/deps#g' /usr/share/metasploit-framework/modules/exploits/windows/smb/eternalblue_doublepulsar.rb
i know , i know. but i'm thinking that if you want to do some "white hat" pentesting (probably 96% of people that opened the video aren't going to do ethical pentesting) on something you need to consider the fact that windows servers and windows 10 machines , the most common targets for script-kiddies and lamers, will probably be updated . but if we consider a over all number , yes , you are right. oh and thanks for the fast answer.
For anyone waiting for the SS7 video, please have patience. I am working extremely hard on getting it published.
HackerSploit Thank you sir.. Eagerly waiting
HackerSploit
Damn that’s will be great but I wanna know ...
Did you study Communication System/Engineering
Or something similar to this fields
Cuz a lot of people talk about it but they don’t know that SS7 is a protocol and it has an exploit in it which hard really to fix for multiple reasons main that’s we need to have a new sort of an Architecture
yesssssssss
waiting for this video .....& plese make mitm attack video
Iam waiting for it
14:50
"...I've heard many stories student hacking into their school network......you can definitely do it..."
You made my day.
Why?
Eternalblue & Eternalchampion is otherwise known as a special exploit, next to all the normal exploits of the Equation Groups toolkit, and the doublepulsar is a payload. just so people know, who are a little bit confused about the two, also AWESOME video, helped me out 100% thumbs up for you mate :)
hackersploit never disapoints!! been watching you since i was 15
I been practicing attacking and scanning IPV6, great fun.
Hi, all your videos are very interesting. Just a remark , you talked to quickly. Don't forget that these videos are watching worldwide. Keep on sharing your knowledge buddy and god bless you.
Yeee still works 🤩🤩
The reason behind why your don't work is in 2021 you need to set a payload before you run , so set a payload called windows / arch (86x/64x ) / metepreter/reverse_tcp
Then run !
Any other probs? Im free to clear for you . ask down below im there to help anytime 😃
I got fail instaed of win while exploit can you please tell the reason
Hello, for everybody who have a lot of errors and the exploit doesn't works :
(Before you do "run" in the exploit in metasploit) :
1. Make sure that TARGETARCHITECTURE is set to your target architecture : x64 (64 bits) | x86 (32 bits)
2. The most important one :
set DOUBLEPULSARPATH /root/.msf4/modules/exploits/windows/smb/deps/
set ETERNALBLUEPATH /root/.msf4/modules/exploits/windows/smb/deps/
# or set the path to the directory where you have the deps folder
Hope it works :)
10:08 and next 5 seconds made my day, but hey, nice of a guide! :P
Thanks for the post. Helped me take down 2 OSCP hosts with relative ease.
Very well done, my friend. Nice work, and thank you very much. I love your channel.
fantastic bro you are the great hacker. big fan
Hey alexis, first of all great video. Secondly, could you please make a video covering all aspects of MITM attacks.
😀
i am getting "Failed to load module: exploits/windows/smb/eternalblue_doublepulsar" this error
*Dudes important notice* :+ this Exploit will work only when the Doublepulsar1.3.1.exe already exists in the target system then It will scan it properly and print the message target infected and when exploiting, the file also must be (doublepulsar1.3.1.exe) already existed in the target system. Its all 'bout social engineering.............
Waiting for next video about attack on WAN :D
Your right just stayed in One of swedens biggest hotels and all their Employee computers were on Windows 7. Very interesting actually…
We should add listening hosts and ports or not? or is it like it is necessary only when port forwarding is to be done, not needed if the target is in the same network as ours.
What commands do i use to download the scanner and the enthernalblue program? And do i need to portforward for this tutorial?
If the target is on your LAN you do not need port forwarding, out of your reach...you must do some research before you attack your target.
when i am auxiliary in framework i am getting an error "Failed to load module" not sure what to do need your Help!
most likely u wrote the module name wrong
Hi! I tried this for the x86 architecture Windows 7 SP1 it doesn't work! The exploit is complete but a session is not created
Same problem I'm facing.
If you got solution please help me
It kept on saying “exploit created but no session was created “ for me
Is it possible for this to work on Windows 10? or do I need to download a windows10 .rb file? Love your work
I tried to do it. But when im doing the scan, i only have that is complete but nothing else. Can you help me?
i got: [*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
93339 localhost try to activate the share file options in the victims computer
ok bro
chek ur inbox
same problem...pls send...purnendughosh03@gmail.com
37.57.47.4 goodluck
Is there a way to hide the exploit part when it runs from Avast anti-virus? its picking up the vuln and quarantines it
When we have already compromised a box, how to use that box as proxy to attack other boxes? (Avoid attacking directly). Thanks
How can we make two virtual machines to be isolated and to be on a same network (LAN) . Please help
How do I get wine? When I type apt-get install wine32 it says unable to locate package
sir how w can we do it, if the person is not in our local area network
I have an SMB error: An SMB Error occurred while connecting top the IPC$ tree. PLeASE Help me!!!!!!
Great content. Where can I find the 'Port Forwarding' video?
i cant run the new double pulsar module, it says xan fine xml file on run time of double pulsar.
i installed wine 32
as well as placed exploit in folder
can you share the windows 7 iso that you exploited, coz the version i am trying to install is not vulnerable.
Microsoft released a security update in jan,2019 for windows 7 which includes SMBv2. So, this exploit will only work on the machines who haven't installed that security update
Oh fuck , for real?
So thats why mine is not working??!
sir why it is showing me 'Host does NOT appear vulnerable' when I am running msfconsole even I've off my windows 7 firewall. please tell me sir
Installing wine does not create the wine folder by itself. Run "winecfg" in the terminal for the wine folder to appear.
Moe Green hey. Good point. Hope you reply to this.
we need to turn of the firewall ?
How can we scan a wan network vulnerable computer??
i can not access my root directory...hiw to fix that problem
it wont works on my lap
i have tried a lot
can you please figure it out
always it shows 0027 error code
i couldnt find the solution
after showing LAUNCHING ETERNALBLUE...it shows
PNP_ADDDEVICE ENNOT PARSE REPORT DISCRIPTOR
and bla bla bla..at each line the 00277 error code fund
i am learing by watching your videos bro...please help me
can be use with windows 8, 8.1 and windows 10?
Yes you need window10.rb
Attack using Eternal Blue does not work on Windows 10 and even on the Original Windows 7 users as long as the users always maintain their windows updates frequently cause Microsoft has released patches to stop this kind of attack from the eternal blue.
Can you make a video on about how to enable USB debugging on a locked screen Android devices through ADB USB method? Much oblige.
Terror Of Death type: adb usb
where can i download windows 7 vulnerable in eternalblue? because i want to create my demonstration in school thanks.
I don't understand how it works on LAN? Please explain how? What will the rhost be?
the victim's IP, on victims IP type ipcofig for windows pc's or ifconfig for linux computers
exploit completed, but no session was created.
Can I get the windows 7 version that is used in this video?
good friend the download of the rapid7 link is no longer available you can send me the linck from mega or another site to download the exploit
I got a question. Both when you scanned and you ran the EternalBlue exploit, it said that the target was already infected with DoublePulsar or that the backdoor was already installed.
I suppose this is something you would have to install/infect the target with beforehand right? and if so, how would you go around doing that?
It already had the backdoor because I had performed the test on it previously
Reason for making this Video this late?
Hi! the antivirus (Avast) detected exploit! How do you do to antivirus don't detect exploit?
Does this need a internet adapter?
Will it work for getting access to windows 10 pc?
hi,ur tutorials are great..can u tell me when we will see promised "full anonymity" and best pracite tutorial?
bro this msg is showing
[-] Exploit failed: The following options failed to validate:RHOST
[*] Exploit completed,but no session was created.
pls #help
RHOST doesnt exist, check the Rhost from the victim pc
When I go to msfconsole I have msf5 not msf. How to fix?
Follow these steps to add eternalblue to ms5 ua-cam.com/video/4OHLor9VaRI/v-deo.html
What do you think about windows 10?
Can any of this affect the new macos?
Hello my friend.... your videos do need some additional constructs.... 1... try using search 《then the exploit name 》this will search and bring up the exploit path on cli. ...and 2... you need to mention any mitigation strategies to protect against these types of exploits .....better video planning is needed ! 😎
Any mitigation tips for the given topic would be very handy. My interest is mostly defensive.
Steve Firth.... I found this and is useful www.paladion.net/blogs/wanna-mitigate-ransomware-without-tears
Thank you very much for the feedback, I will definitely include the mitigation and paths in future videos focused on exploitation.
Thanks!
Thanks, both :)
Why again do we need wine for this?
वीडियो के लिए धन्यवाद।
what is the explorer. exe file?
it's not working on Windows 10 ?
I BECOME THIS ERROR HELP Exploit failed: RubySMB::Error::InvalidPacket Not a valid SMB packet
how to show the hidden files in root directory using keyboard
how do we download the scanner? smb_ms17_010.rb
where's there a giant star on the link
Finally 😍😍
goood... are u still there... i have a question pls
hmm i couldnt get it to work on both kali and parrot os. it kept giving me an error saying it couldnt find the file and deps.
all AV software by default disable 445 port
So this attack is No longer work
-i dont think that any one Run pc Without Av
Also in office
U colud try FUDs payloads to bypass the antivirus from there we escalate privileges
Do anybody know how can we share a ransomware using eternalblue
How ip subnetting works?
does it bypass AntiVirus?
Does this work in windows 10?
NO
Awesome. But the baddest thing is that it only works on win 7 :-(
hmm... I have win 7, so does that mean... (I'LL DESTROY THESE PEOPLE WHOEVER CREATED THIS VIRUS!!)
@@earthwormsally2954 RIP
@@earthwormsally2954 kill NSA and FBI. Join ISIS of Taliban
@@earthwormsally2954 or upgrade to win 10
thanks a lot i love you alexis
Thanks man for this awesome tutorial,.
i would really appreciate if you can upload a video regarding Wine32/64 because i face an issue exploiting the target due to i believe wine settings.
Work like a charm!
i dont have a msf folder in my root directory can anyone help me
Enable show hidden folders option
msf not updating
Ok i've been collecting too many ips this months
I scanned almost 500 (deffrent countries) ips
Every 499 only one is vuln..
And when i exploit connection refuse
It Working with XP sp3?
Yes
if unpatched, Microsoft made a special update for XP users because of the seriousness of the vulnerability and many people still running XP - oh my!
HackerSploit doesn’t the us military use xp?
Please does anyone know why my text file (.txt) document icon changes to a python icon in kali linux? When I checked properties of the text file, I see that it says kind: Python file(no console) 😞 My last two installations before I noticed this problems are:
1. Telefonica Eternal blue double pulsar (Github)
2. Veil Evasion
I don’t know if any of this programs altered my text document files and changed the icons to python and the kind to python file (no console) instead of plain text document in kali linux
You tried using mv ? N changing?
what do u do for living?
How to remotely install malicious apps on Android devices
but this is not working in 2020 right?
Uh really?
@@8080VB yep, this is only works for windows 7
@@kronoxconversationcenter1316 oh , so thats why my MS17-010 SMB notdetecting in msf ?
Many people (including me) though this malware comes in wild from Russia 🇷🇺 but Russia is highly affected.
15:14 boom
Web pentesting series?
If you want to download and run this in a different directory like /opt other than /root you can use these commands:
cd /opt/
git clone github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
cd /opt/Eternalblue-Doublepulsar-Metasploit/
cp eternalblue_doublepulsar.rb /usr/share/metasploit-framework/modules/exploits/windows/smb/
sed -i 's#root/Eternalblue-Doublepulsar-Metasploit/deps/#opt/Eternalblue-Doublepulsar-Metasploit/deps#g' /usr/share/metasploit-framework/modules/exploits/windows/smb/eternalblue_doublepulsar.rb
Bonne vidéo merci !!!
respect to you!!!!!
plz tell me how to hack window 10 using eternalblue_doublepulsar without knowing username and pass...?
bro! you uploded this video JUST after jack tutorials's video. and on the same topic... wanna tell us something?
Wow, had no idea
in HackerSploits defense, many others upped videos before both of them
do you know that this exploit has been fixed like 3 months ago? ;P
Oh yes, but has every computer in the world been patched, that is the question you should be asking.
i know , i know.
but i'm thinking that if you want to do some "white hat" pentesting (probably 96% of people that opened the video aren't going to do ethical pentesting) on something you need to consider the fact that windows servers and windows 10 machines , the most common targets for script-kiddies and lamers, will probably be updated .
but if we consider a over all number , yes , you are right.
oh and thanks for the fast answer.
Intro song?
many thanx!!!!!!!!!!
Did it got patched recently?
Nope. I tried today still works.
Your working to hard man gg