This is a bulk exploit tool which based on the ms 17-010. At first we tried to use the MSFRPC, but the module is not that stable. Then we directly sent the payload including a user defined reverse session to target, and open a session on the MSFRPC Server which is waiting for the target to connect. The payload is from [https://github.com/pythonone/MS17-010] (https://github.com/pythonone/MS17-010) and the reverse session is generated by msfvenom.
Usage:
- Install msfvenom
- Start msfrpcd service: msfrpcd -P ${password} -t 3000 -a 0.0.0.0 -S
- Add ip address in exploit.py
- Run exploit.py
- Check the session on msfprc server