Windows Eternalblue [CVE-2017-143,144,145,146,148]
Windows Eternalblue [CVE-2017-143,144,145,146,148]
Requirements
Kali Linux
The Kali Linux VM (or any other type of installation)
Laboratory Workflow
1. Launch the Metasploit Framework
2. Search for the appropriate module
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 exploit/windows/smb/ms17_010_eternalblue 2017-03-14 average Yes MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
1 exploit/windows/smb/ms17_010_psexec 2017-03-14 normal Yes MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
2 auxiliary/admin/smb/ms17_010_command 2017-03-14 normal No MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Command Execution
3 auxiliary/scanner/smb/smb_ms17_010 normal No MS17-010 SMB RCE Detection
4 exploit/windows/smb/smb_doublepulsar_rce 2017-04-14 great Yes SMB DOUBLEPULSAR Remote Code Execution3. Use the module
4. Check the module options
5. Set the appropriate options
6. Run the exploit
7. Meterpreter session
7. Open a shell on the target machine
8. Capture the screen on the target machine

9. Stream the screen of the target machine

10. Capture image from the webcam on the target machine
11. Stream from the webcam on the target machine

Video


Questions
Last updated