In this tutorial we will be exploiting a SMB vulnerability using
the Eternalblue exploit which is one of the exploits that was recently
leaked by a group called the Shadow Brokers. Eternalblue exploits a
remote code execution vulnerability in SMBv1 and NBT over TCP ports 445
and 139. At the time of writing it targets a wide range of Windows
operating systems, from Windows XP up to Windows Server 2012. The
currently available exploits do not target Windows 10 and Windows Server
2016 but most likely will in the near future when they are being
modified.
| Learn | Security | Together |
The quieter you become, the more you are able to hear
Saturday, April 22, 2017
Quick Start Getting Started with Empire
Initial Setup
Run the ./setup/install.sh script. This will install the few dependencies and run the ./setup/setup_database.py script. The setup_database.py file contains various setting that you can manually modify, and then initializes the ./data/empire.db backend database. No additional configuration should be needed- hopefully everything works out of the box.Running ./empire will start Empire, and ./empire –debug will generate a
Subscribe to:
Posts (Atom)