
With win32, it’s now possible to run the frameworkįUZZBUNCH coded in Python 2.6 with the need of PyWin32 v2.12. This is done with these contentstore]# dpkg –add-architecture i386 & apt-get update & apt-get install wine32 The FUZZBUNCH and Doublepulsar NSA tools use 32 bit windows libraries that needed for running on Kali the enabling of multiarch. Kali and Metasploit environment configuration This is the laboratory created in my Virtual Box for simulating the attack:īefore starting with the attack, I will describe all the steps necessary for preparing Kali and Metasploit.

The execution of windows tools will be transparent thanks to exploit code for metasploit released by elevenpaths. One of these esploit called Eternalblue, fixed by the MS17-10 Windows bulletin, permits to take a remote control of any windows system not patched by FUZZBUNCH and Doublepulsar NSA tools (windows tools).Įternalblue is the exploit used in this laboratory for compromising a windows xp system. The windows tools will be running in kali by a window emulator, called wine. The effects are very heavy: think to the infame WannaCry malware that has just used the MS17-010 vulnerability for attacking all the system vulnerables found scanning the surrounding network.įor these reasons I will focus about how to exploit the MS17-010 for compromising a Windows XP with Service Pack 2 not pached using kali and metasploit.Ī bit of history for better understanding.Įarlier this year the ShadowBrokers has published a lot of stuff stolen from the NSA Arsenal (git repository ) containing tools and exploit for Windows. Infact attacking a PC surfing the internet and transforming it into a trojan horse to compromise internal systems is now a well-established practice (see my article about the pivot attack).


Thinking that if the system is not reachable from outside is not necessary to update it is absolutely false.

I’m doing it simply for increasing the sensitivity of system administrators to the importance of upgrading their systems. I’m resuming again with an article on how to put into practice a exploit that has killed so many victims.
