关联漏洞
标题:Microsoft Windows SMB 输入验证错误漏洞 (CVE-2017-0148)Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Server Message Block(SMB)Server是其中的一个为计算机提供身份验证用以访问服务器上打印机和文件系统的组件。 Microsoft Windows中的SMBv1服务器存在远程代码执行漏洞。远程攻击者可借助特制的数据包利用该
介绍
## EternalBlue = MS17-010 vulnerability
The code is a script written in Ruby that is part of the Metasploit Framework. Metasploit is a tool used by security professionals to test the security of computer systems and networks. It helps identify vulnerabilities and provides a platform for developing and executing exploits.
The script is used to detect the MS17-010 vulnerability, also known as EternalBlue. This vulnerability affected Windows systems and gained significant attention due to its role in the WannaCry ransomware attack.
The script attempts to determine if a target system is vulnerable to MS17-010 by performing a specific type of communication with the target system using the SMB protocol, which is used for file sharing and communication in Windows networks. By analyzing the response received during this communication, the script can determine if the target system is vulnerable to MS17-010 or not.
The script uses various functions and APIs provided by the Metasploit Framework to construct and send the necessary packets to the target system, and then interprets the response to make an assessment.
文件快照
[4.0K] /data/pocs/0203cfb98a0c93b3e365add4ff16bebead0a5cbf
├── [4.5K] code.rb
├── [1.0K] LICENSE
├── [1.1K] README.md
└── [4.0K] Shellcode.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。