Blue (Easy)
Last updated
Last updated
Vulnerable Exploit: Eternal Blue (MS17-010) - CVE-2017-0144
System Vulnerable: 10.10.10.40
Vulnerability Explanation: The machine is vulnerable to MS17-010 which allow remote attackers to execute arbitrary code via crafted packets "Windows SMB Remote Execution Vulnerability."
Privilege Escalation Vulnerability: N/A
Vulnerability Fix: Recommend to patch the vulnerable.
Severity: Critical
Step to Compromise the Host:
Let start enumerate with SMB service (139, 445) and find is there any vulnerable to this service. We have found that it is vulnerable to MS17-010. With successfully exploit this vulnerable, could allow attacker gain remote code execution on the machine.
Let search for public exploit to this vulnerable. We found the exploit code on exploit-db.
Let copy the exploit code and change the file name 42315 to exploit.py. We found the link to download mysmb.py which is the requirement for this exploit work.
Generate the window reverse shell payload.
To make the exploit code work we need to customize some part of the code. First change the username from empty to 'guest' or '//' and customize the location of the payload script.
Save the script and run against our target IP address with netcat listener on port 4444.
Let grab the flag and IP address of the machine.
Proof of Concept Code: