Exploiting Eternalblue & DobulePulsar MS17-010
Exploiting Eternalblue & DobulePulsar MS17-010 (A root behind of Mass attack of WannaCry and Petya malwares) Brief Description: This exploitation uses the buffer over vulnerability in SMBv1 of windows OS. Without going in detailed technical analysis about the vulnerability, this document shows the exploitation of 32 Bit Windows 7 OS using metaSploit provided within Kali. Pre-requisites • Target Windows 7 32Bit OS with running 445 Port with SMBv1 protocol. (Windows OS runs default with 445 Port) • Attacker Up-to-date Kali Box with metaSploit with 1. smb_ms17_010.rb ruby script to check MS17_010 vulnerability check on target. Download Link: https://github.com/rapid7/metasploit framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb 2. Exploit code Eternalblue-Doublepulsar-Metasplo...