尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft Corporation | Windows SMB | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance) | https://github.com/peterpt/eternal_scanner | POC详情 |
| 2 | CVE-2017-0144 | https://github.com/kimocoder/eternalblue | POC详情 |
| 3 | None | https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution | POC详情 |
| 4 | Chương trình theo dõi, giám sát lưu lượng mạng được viết bằng Python, nó sẽ đưa ra cảnh báo khi phát hiện tấn công CVE-2017-0144 | https://github.com/quynhold/Detect-CVE-2017-0144-attack | POC详情 |
| 5 | LAB: TẤN CÔNG HỆ ĐIỀU HÀNH WINDOWS DỰA VÀO LỖ HỔNG GIAO THỨC SMB. | https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144 | POC详情 |
| 6 | CVE-2017-0144 (Eternal Blue) | CVE-2023-3881 | CVE-2011-2523 | https://github.com/AnugiArrawwala/CVE-Research | POC详情 |
| 7 | Can you exploit the EternalBlue vulnerability (CVE-2017-0144) on a Windows 7 system and retrieve the hidden flag? Your goal is to gain administrative privileges and locate the flag.txt file stored in the `C:\Windows\System32` directory. | https://github.com/sethwhy/BlueDoor | POC详情 |
| 8 | AutoBlue - Automated EternalBlue (CVE-2017-0144 / MS17-010) exploitation tool leveraging Nmap and Metasploit for ethical hacking, penetration testing, and CTF challenges. Strictly for authorized and educational use only! | https://github.com/AtithKhawas/autoblue | POC详情 |
| 9 | This script checks for devices vulnerable to the EternalBlue exploit (CVE-2017-0144) in a network using SMB. | https://github.com/MedX267/EternalBlue-Vulnerability-Scanner | POC详情 |
| 10 | Automated bash script which scans an ip for potential vulnerability to eternalblue using nmap and then exploit using metasploit framework which uses the CVE-2017-0144 vulnerability[Code name: EternalBlue] in (windows 7,windows 2008 servers,etc.) to gain access to a windows 7 machine and establish a reverse meterpreter shell. | https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework- | POC详情 |
| 11 | None | https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144 | POC详情 |
| 12 | This report outlines a structured VAPT engagement focusing on PCI DSS compliance, SMB service enumeration, and exploitation of CVE-2017-0144 (EternalBlue) on a Windows 10 machine within a finance-oriented infrastructure. | https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint | POC详情 |
| 13 | Educational documentation on EternalBlue (CVE-2017-0144) – Windows SMB vulnerability, history, and mitigation. No exploit code. | https://github.com/nivedh-j/EternalBlue-Explained | POC详情 |
| 14 | CVE-2017-0144 | https://github.com/B1ack4sh/Blackash-CVE-2017-0144 | POC详情 |
| 15 | None | https://github.com/AbbeAlthany/Windows-7_och_CVE-2017-0144_Exploit | POC详情 |
| 16 | CVE-2017-0144 | https://github.com/Ashwesker/Blackash-CVE-2017-0144 | POC详情 |
| 17 | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." | https://github.com/Mitsu-bis/Eternal-Blue-CVE-2017-0144-THM-Write-Up | POC详情 |
| 18 | CVE-2017-0144 | https://github.com/FireTemple/Blackash-CVE-2017-0144 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论