Sinisterly
Eternalblue exploit x86 windows 7 injection explorer - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: Hacking (https://sinister.ly/Forum-Hacking)
+--- Forum: Remote Administration & Stress Testing (https://sinister.ly/Forum-Remote-Administration-Stress-Testing)
+--- Thread: Eternalblue exploit x86 windows 7 injection explorer (/Thread-Eternalblue-exploit-x86-windows-7-injection-explorer)

Pages: 1 2


Eternalblue exploit x86 windows 7 injection explorer - hellboydz - 08-08-2020

For Educational Purposes Only..✔️
link join for help more channel : https://t.me/joinchat/AAAAAFb1A_86T64nKd4XDQ
I found way easy better than trash inject into default useful explorer.exe as many running on windows or try another you want help I just want to explain how easy to do new way improve your idea to break secure




RE: Eternalblue exploit x86 windows 7 injection explorer - mothered - 08-09-2020

Interesting.

Is It not compatible with the 64-bit architecture?


RE: Eternalblue exploit x86 windows 7 injection explorer - hellboydz - 08-09-2020

(08-09-2020, 03:29 AM)mothered Wrote: Interesting.

Is It not compatible with the 64-bit architecture?

easy command : unset architecture x86 to x64 architecture but must use my explorer.exe don't use another method inject because explorer are default and many metasploit are simple


RE: Eternalblue exploit x86 windows 7 injection explorer - mothered - 08-09-2020

(08-09-2020, 08:12 AM)hellboydz Wrote: easy command : unset architecture x86 to x64 architecture but must use my explorer.exe don't use another method inject because explorer are default and many metasploit are simple
Too easy. I thought x64 was not supported altogether.

Thanks for clarifying my question.


RE: Eternalblue exploit x86 windows 7 injection explorer - hellboydz - 08-09-2020

(08-09-2020, 12:32 PM)mothered Wrote:
(08-09-2020, 08:12 AM)hellboydz Wrote: easy command : unset architecture x86 to x64 architecture but must use my explorer.exe don't use another method inject because explorer are default and many metasploit are simple
Too easy. I thought x64 was not supported altogether.

Thanks for clarifying my question.

useful command on metasploit and this exploit better than russia made it 300$
unset you set wrong IP or you want undo try use : ex unset RHOST
or unset LPORT etc
command : show targets (what system can target or can do)
show options (options module that what need to do)
show info (news or info module)
now I try convert NSA exploit into RAT and sell it I hope here place for ads


RE: Eternalblue exploit x86 windows 7 injection explorer - lncat - 08-18-2020

很喜欢这教学,一个很棒的教程,学习到了新姿势,楼主可以把教学视频里的GItHub地址发下吗?和视频里的远程控制软件生成器发分享下吗?我也想模拟试试,可以的话不胜感谢!


RE: Eternalblue exploit x86 windows 7 injection explorer - mothered - 08-18-2020

(08-18-2020, 10:06 AM)lncat Wrote: 很喜欢这教学,一个很棒的教程,学习到了新姿势,楼主可以把教学视频里的GItHub地址发下吗?和视频里的远程控制软件生成器发分享下吗?我也想模拟试试,可以的话不胜感谢!
As a friendly reminder and as stated In the rules, this Is an English-speaking board.


RE: Eternalblue exploit x86 windows 7 injection explorer - lncat - 08-18-2020

(08-18-2020, 10:24 AM)mothered Wrote:
(08-18-2020, 10:06 AM)lncat Wrote: 很喜欢这教学,一个很棒的教程,学习到了新姿势,楼主可以把教学视频里的GItHub地址发下吗?和视频里的远程控制软件生成器发分享下吗?我也想模拟试试,可以的话不胜感谢!
As a friendly reminder and as stated In the this Is an English-speaking board.

I am sorry that my English is poor and I need to use an interpreter to understand what you said. Thank you for reminding me to read the rules of the forum. Thank you
I hope this translator translated English correctly


RE: Eternalblue exploit x86 windows 7 injection explorer - mothered - 08-18-2020

(08-18-2020, 10:30 AM)lncat Wrote:
(08-18-2020, 10:24 AM)mothered Wrote:
(08-18-2020, 10:06 AM)lncat Wrote: 很喜欢这教学,一个很棒的教程,学习到了新姿势,楼主可以把教学视频里的GItHub地址发下吗?和视频里的远程控制软件生成器发分享下吗?我也想模拟试试,可以的话不胜感谢!
As a friendly reminder and as stated In the  this Is an English-speaking board.

I am sorry that my English is poor and I need to use an interpreter to understand what you said. Thank you for reminding me to read the rules of the forum. Thank you
I hope this translator translated English correctly
All good.

My post was simply a reminder of the board's posting requirements.


RE: Eternalblue exploit x86 windows 7 injection explorer - hellboydz - 08-18-2020

(08-18-2020, 10:30 AM)lncat Wrote:
(08-18-2020, 10:24 AM)mothered Wrote:
(08-18-2020, 10:06 AM)lncat Wrote: 很喜欢这教学,一个很棒的教程,学习到了新姿势,楼主可以把教学视频里的GItHub地址发下吗?和视频里的远程控制软件生成器发分享下吗?我也想模拟试试,可以的话不胜感谢!
As a friendly reminder and as stated In the  this Is an English-speaking board.

I am sorry that my English is poor and I need to use an interpreter to understand what you said. Thank you for reminding me to read the rules of the forum. Thank you
I hope this translator translated English correctly

it ok i'm same to you my stupid English very poor too

(08-18-2020, 10:06 AM)lncat Wrote: 很喜欢这教学,一个很棒的教程,学习到了新姿势,楼主可以把教学视频里的GItHub地址发下吗?和视频里的远程控制软件生成器发分享下吗?我也想模拟试试,可以的话不胜感谢!

yes bro that in github

(08-18-2020, 10:37 AM)mothered Wrote:
(08-18-2020, 10:30 AM)lncat Wrote:
(08-18-2020, 10:24 AM)mothered Wrote: As a friendly reminder and as stated In the  this Is an English-speaking board.

I am sorry that my English is poor and I need to use an interpreter to understand what you said. Thank you for reminding me to read the rules of the forum. Thank you
I hope this translator translated English correctly
All good.

My post was simply a reminder of the board's posting requirements.
https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit