• XSS.stack #1 – первый литературный журнал от юзеров форума

EternalBlue: [Mass-scanner + Automated Exploiter].

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.
For what is already available for free in metasploit and is no longer relevant?
Official Microsoft Security Bulletin : " https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-010 ".
-From Windows 7 to Windows 10 vulnerable systems. (Almost any version of Windows - For more information read the above reported link).
Do you really think I'm stupid enough to sell something publicly comparable? You are completely out of road, my friend.

It is an outdated vulnerability, but; to date, it is still highly widespread , worldwide . You can read Reports on the Web.
The module integrated in Metasploit does not show the exact functionality of my tool. My tool allows, really, to make a Business, through the latter ... The Module in Metasploit is much more limited technically, of course . It doesn't even have 50% of the functionality of what I sell.

(Please note carefully): The free Metasploit module CAN'T do everything automated: or, with precision, as said, it can't do even the 50% of what my script features allow/propose: That is: Mass-Scanning + Mass-Exploiting [Download and execute - In various nature; NOT only executable (.EXE); but also DLL library (.DLL); and even PowerShell script (.PS1).

[Final comment]: Use that as well, you are free to choose, of course. But don't complain if you can't earn nothing / or in the best case, as much as those who bought: -> my FULLY-AUTOMATED-script . (And of course, stable and working).

Sales are continuing! ...
Guarantor is welcome!



Eternalblue Proof - Content.png
Eternalblue Proof - Shellcode.png
 
Последнее редактирование:
Statistics and information details about "Eternalblue":
1) [Mainly - Most useful indicators]: Global diffusion of the vulnerability, and related information: [Updated to: "02 July 2018"]. >(Still and indicator of the related diffusion, according to contextual circumstances). -> "https://app.powerbi.com/view?r=eyJr...lYzItNDM2MC05ZmI1LTNlNWQ3N2IyM2JkNyIsImMiOjl9". (From Omerez: " ").

$-> Data extracted from above: "687,000+" PC's vulnerable.

-------##### Minor evidence/discussion. #####-------

2) Microsoft technical: "https://support.microsoft.com/en-us/help/4023262/how-to-verify-that-ms17-010-is-installed".
3) Intrinsic Packet-Level Analysis of "Eternalblue": "https://www.hackers-arise.com/post/...ket-level-analysis-of-the-eternalblue-exploit".
4) CyberCriminals using "Eternalblue" to spread cryptocurrency miners: "https://cybernews.cloud/lemon-duck-brings-cryptocurrency-miners-back-into-the-spotlight". (News updated to: "14 October 2020").
5) Moreover, further CyberCriminals exploiting "EternalBlue": "https://translate.google.com/translate?hl=it&sl=en&tl=it&u=https://www.lineaedp.it/news/48409/report-check-point-sui-primi-6-mesi-del-2020/#.XyLlJ-fONPZ". (News updated to: "27 July 2020").
6) //. -> "
".
7) Malwarebytes Labs: "2020 State of Malware Report": "https://resources.malwarebytes.com/files/2020/02/2020_State-of-Malware-Report.pdf". (Discusses also, current evidence; concerning the use, to date, of "Eternalblue" as "Worm").
8) "Omerez" quite "outdated", but still equally, partially, an indicator: "https://omerez.com/eternal-blues-worldwide-statistics/".
9) Moreover; useful read: "https://www.welivesecurity.com/2019/05/17/eternalblue-new-heights-wannacryptor/". (Related to "Eternalblue").
10) Moreover, useful read: "https://go.kaspersky.com/rs/802-IJN-240/images/KSB_2019_Statistics_EN.pdf". (Related also to "Eternalblue").
11) From "Rapid7": "https://www.rapid7.com/info/threat-report/2018-q4-threat-report/". (Citation: "The persistence of Eternalblue").
12) Moreover: "https://securityintelligence.com/ne...devices-with-the-help-of-eternalblue-exploit/". (January 8, 2019).
13) Moreover: "https://www.wsj.com/articles/u-s-cities-strain-to-fight-hackers-11559899800".
14) Moreover: "https://www.helpnetsecurity.com/2020/03/04/attack-traffic/".
15) Moreover: "https://www.ibtimes.sg/hackers-used...tack-baltimores-computer-systems-report-30987".
16) Moreover: "
".
17) From F-Secure: "https://www.f-secure.com/en/press/p/attacks-using-iot-devices-and-windows-smb-escalate-in-2019".
18) From F-Secure blog: "https://blog.f-secure.com/attack-landscape-h1-2019-iot-smb-traffic-abound/".
------------------------------------------

-> Complete features list, and instructions:
1) Scan CIDR Range.
2) Scan Custom List. (*).

(*)
1) [Better choice]: "https://www.countryipblocks.net/acl.php".
2) "https://lite.ip2location.com/ip-address-ranges-by-country".
3) "https://www.ripe.net/about-us/press-centre/IPv4CIDRChart_2015.pdf".

Option 1: (Self-explanatory).
Option 2: Filename to scan from: Europe CIDR#1.txt
Eternalblue - Filename.png


[Next step]:
-------Payload Menu-------
1. Download & Execute (EXE)
2. Download & Execute (DLL)
3. Invoke-PoshScript (PS1)
-Choose the desired infection vector. [Suggestion: In case of availability: ".PS1"]. (PowerShell script - Bypass Anti-Malware better).


"Please choose an option": 1
"Payload Direct URL": https://file.io/hzbiO6TbAMXc [It's highly recommended to use, as hosting/VPS, your own server/domain: "Offshore/Bulletproof"].
"Payload Name": svchost [Suggestion: use a payload spreading-name related to common services running in "Windows"].

Eternalblue - Payload.png


Scan Mode 1: Scan entire IP list (Exit On Finish).
Scan Mode 2: Scan entire IP list (Non-Stop Scan).
[Self-explanatory].

##### -> RESULTS <- #####

Eternalblue - Timed out.png


[Exception: timed out] = "Server Unreachable". (Primary Cause: "Offline").

Eternalblue - No route to host.png


[Exception: (Errno 113) No route to host] = "(Primary causes): "Firewall" blocked the connection; Network configuration is faulty; NO SMB (Server Message Block) protocol Active/Vulnerable; others Network incompatibility".

Eternalblue - Connection refused.png


[Exception: (Errno 111) Connection refused] = "(Primary cause): -> "Firewall" blocked the connection. (Others variables minor): Network configuration is faulty; NO SMB (Server Message Block) protocol Active/Vulnerable; others Network incompatibility".

Eternalblue - Does NOT appear vulnerable.png


["Does NOT appear vulnerable"] = "Server is Online; everything has gone fine during the connection handshake; but, most likely PATCHED".

Eternalblue - Network is unreachable.png


[Exception: (Errno 101) Network is unreachable]. = "Issues during the connection handshake".

RDP's - Scanning.png


[Exception: "(Errno 10061) No connection could be made because the target machine actively refused it"] = "(Primary cause): -> "Firewall" blocked the connection. (Others variables minor): Network configuration is faulty; NO SMB (Server Message Block) protocol Active/Vulnerable; others Network incompatibility".
------------------

-> [In the case of a vulnerable node, the script will automatically execute your specified vector of infection, and "stamp" the successful exploitation. After the infection is done correctly, will continue to check the "CIDR range" remaining, previously configured].

##### -> END RESULTS <- #####


(Please note): as the last screenshot above represents, I'm using simultaneously two RDP's, with two different European lists. (Obviously).
[Suggestion, to massimize the power of the script: buy cheap cracked Windows RDP, (Or crack them your own) install Python 2.7/PIP; install all the following requirements: "pip install impacket pycrypto clint ipaddress pyasn1"; and run multiple (Higher the quantity=faster/better results) instances (Over multiple RDP's). You will get a much broader distribution of your infection].
--------------------------------

Sales are continuing! ...
Guarantor is welcome!

Thanks in advance!
Best regards,
VoidZero.
 
Последнее редактирование:
ok, can u give simple test to make reward on dat board?!
The best I can do, in order to affirm my legitimacy, (Besides fully accepting the "Guarantor", of course) is to show you remotely (TeamViewer; AnyDesk) how it works. (Including the disclosure of the two RDP's Windows in action. In this way, you can also be sure of Windows compatibility).

[I can't, of course, release you, "in hand", the attached files; as there is a risk of potential leakage; as well as objectively incorrect to me, and towards those users interested in buying. (Who, although waiting, are already there)].

-> In case you agree, to this form of "Simple-Test", contact me in private; and we will agree in detail.

Thanks in advance!
Best regards,
VoidZero.
 
SPECIAL OFFER!
-Exclusively for the first two buyers: 12.5% discount on your copy!. (Total exceptional price: "175$").
[End of special offer: Monday, 01 November 2020].


Contacts: using Private-Message function of the Forum, or external; 1) XMPP: "arsenic@thesecure.at". (OTR); 2) Telegram: "VoidZero_0".

Thanks in advance!
Best regards,
VoidZero.
 
SPECIAL OFFER!
-One copy already sold. A single one remains, at a reduced price.
[End of special offer: Monday, 01 November 2020].

Contacts: using Private-Message function of the Forum, or external; 1) XMPP: "arsenic@thesecure.at". (OTR); 2) Telegram: "VoidZero_0".

Thanks in advance!
Best regards,
VoidZero.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
купил думал там увидеть дургую реалицаю немного)
но там
print(" No accessible SMB Pipe Names found.")
это тот же эксплойт что в мете.
ms17_psex просто в дургой обвертке)
по сути паблик )
 
Пожалуйста, обратите внимание, что пользователь заблокирован
купил думал там увидеть дургую реалицаю немного)
но там
print(" No accessible SMB Pipe Names found.")
это тот же эксплойт что в мете.
ms17_psex просто в дургой обвертке)
по сути паблик )
https://github.com/worawit/MS17-010/blob/master/checker.py
чекер кстати вот отсюда взят
https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode/blob/master/auto_mode.py
а вот отсюда код взят
тут баннер переделан

можете банить америкоса за паблик)
 
https://github.com/worawit/MS17-010/blob/master/checker.py
by the way, checker is taken from here
https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode/blob/master/auto_mode.py
but from here the code is taken
here the banner is redone

you can ban americos for public)
>You are, absolutely, WRONG!
They are fully different scripts!
The first report has, literally, nothing related to mine script. (It's just an unfounded assumption on your part). The second link show "EternalBlue - EK" which it was another product, sold by a different user! It's leaked his version, but, again, not the same product! Also, the "EternalBlue - EK" you reported is an old: version 1.0. (Moreover, the latter does not even work!).
Mine is a fully working, with broader features, stable, coded by own scratch script! Don't try to ruin my business with bullshit/clearly stupid statements.
If there is someone here that should be banned for false slander: that's only YOU!
[Note]: I can show the full-source to a Moderator, to judge; if needed! (I don't have nothing to hide, obviously).-Fu####g I###t!
Again, they are just unfounded assumptions on your part!
-Nothing more!

Finally, as further proof: -give a look to the HUGE differences between mine files, and the one's you mentioned.

#Leaked: fully different (Not working) old engine/script:
111.png

222.png


#My fully working/stable/updated/broader features engine/scripts files: (Already posted, but again, as further proof).
333.png

444.png

Do you still have doubts?! It's very clear! Pure evidence!

-----------
Discussion closed!

Sales are continuing! ...
Guarantor is welcome!

Contacts: using Private-Message function of the Forum, or external; 1) XMPP: "arsenic@thesecure.at". (OTR); 2) Telegram: "VoidZero_0".

Thanks in advance!
Best regards,
VoidZero.
 
Последнее редактирование:
[Update]:
-Special offer closed! The price returns to the established standard, namely: "$200".

Sales are continuing! ...
Guarantor is welcome!

Contacts
: using Private-Message function of the Forum, or external; 1) XMPP: "arsenic@thesecure.at". (OTR); 2) Telegram: "VoidZero_0".

Thanks in advance!
Best regards,
VoidZero.
 
SPECIAL OFFER!
[Offer valid: until 31 October 2020].

Exclusively dedicated to: the first two buyers, chronologically!
Buy "EternalBlue: [Mass-scanner + Automated Exploiter]" for "200$"; and in addition totally free of charge you will also get "Mass RDP Automated Exploiter: Sticky-Keys-Slayer - Windows Backdoor checker". (Optimized code than the public one/easier/easy to configure). To the latter will be attached several lists of RDP's: (Worth hundreds of dollars. Chargingly paid for and downloaded via "Shodan" Web service API) related to several, highly developed/high GDP/rich countries. Very large! Total: "490,118" unique (Most likely Corporates) RDP's.

Don't miss this unique offer!
The value of the entire package is well above the mere "$200" required.


Sales are continuing! ...
Guarantor is welcome!

Contacts
: using Private-Message function of the Forum, or external; 1) XMPP: "arsenic@thesecure.at". (OTR); 2) Telegram: "VoidZero_0".

Thanks in advance!
Best regards,
VoidZero.
 
Статус
Закрыто для дальнейших ответов.
Верх