About:
+ A set of python2 scripts for sweeping a list of IPs for the presence
of both SMB and RDP versions of the DOUBLEPULSAR implant that was
released by the Shadow Brokers. Supports both single IP checking and a
list of IPs in a file with multi-threading support.
+ This is an early release in the interests of allowing people to
find compromises on their network now that these exploits are in the
wild and no doubt being used to target organizations. It re-implements
the ping command of the implant, which can be used remotely without
authentication, in order to determine if a system is infected or not.
Both SMB and RDP versions of the implant are supported.
doublepulsar detection script
+ Not all OS versions have been tested and some currently fail. For
example, 2012 will reject the SMB sequence with ACCESS_DENIED. However,
this system is not vulnerable to the ETERNALBLUE exploit and the
DOUBLEPULSAR implant receives the same error when trying to ping a
target. Therefore, it is possible that errors against certain windows
versions may be indicative that the system is not compromise.
Usage:
git clone https://github.com/countercept/doublepulsar-detection-script && cd doublepulsar-detection-script
python2 detect_doublepulsar_smb.py -h
Example:
python2 detect_doublepulsar_smb.py --ip 192.168.172.11
|
Aucun commentaire:
Enregistrer un commentaire