Blue
Tags
Introduction
An easy rated Windows machine that demonstrates the critical vulnerability in Windows SMBv1, also known as MS17-010 or 'EternalBlue'.
Table of Contents
Reconnaisance
Start out by running nmap
as always.
This gives us quite a few TCP ports open but the 5 digit ones we don’t really care about. We’re looking at the other three, 135, 139 and 445. Ports 139 and 445 are typically where Windows SMB is running. We can see in the host script results from nmap
that this is a Windows 7 Professional 7601 Service Pack 1 machine.
Coming to this machine in 2024, it’s well known what the attack vector is (just given the name and from word of mouth about this particular box). But assuming I didn’t know, the next step would be to Google exploits for this specific OS and Service Pack. Doing that, you’d easily find MS17-010
Here is a brief explanation of the differences in the SMB ports.
Enumeration
We could really just jump right to exploitation at this point but I did this on “Guided Mode” with a friend that at the time was still learning and this path has you enumerate SMB, so we will here too.
Using smbclient
(or crackmapexec
), we can easily list out the SMB Shares.
That’s really it for enumerating SMB. We can see there’s 5 shares. Now to exploiting this.
Exploitation
Knowing what we know about the attack vector, we can start up metasploit
. After it starts up, we can search for the exploit ms17-010
and we get some good looking results.
We use 2
since we know our target machine is Windows 7 and it sets the target for us.
Yes, I put execute
instead of exploit
. Stop laughing at me.
Just like that we have a meterpreter session.
Foothold
We can use some nifty meterpreter commands to get some information.
At this point, we own the system. We are the King of the castle and have full access. We can get the user and root flags from here.
Conclusion
This machine is fun to do. It’s quick, especially with Metasploit, and easy. It demonstrates how severe this MS17-010, EternalBlue, vulnerability really was and the damage it could/can do. After this vulnerability was released by The Shadow Brokers (after being stolen from the NSA), multiple malwares were created. The first notable being WannaCry (Wikipedia). The next notable would be NotPetya, a variant of the Petya malware which has been attributed to Russian hacking groups.
Last Modified On
22:55:01 01 August 2024 UTC