关联漏洞
标题:
Microsoft Windows SMB 输入验证错误漏洞
(CVE-2017-0143)
描述:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。SMBv1 server是其中的一个服务器协议组件。 Microsoft Windows中的SMBv1服务器存在远程代码执行漏洞。远程攻击者可借助特制的数据包利用该漏洞执行任意代码。以下版本受到影响:Microsoft Windows Vista SP2,Windows Server 2008 SP2和R2 SP1,Windows 7 SP1,Windows 8.1,Windows Server 2012 Gold
描述
EternalBlue is a well-known SMB exploit created by the NSA to attack various versions of Windows, including Windows 7. Etern-Blue-Windows-7-Checker will basically send SMB packets to a host to see if that Windows host machine is vulnerable to the EternalBlue exploit (CVE-2017-0143).
介绍
# Eternal-blue-Windows-7-Checker
EternalBlue is a well-known SMB exploit created by the NSA to attack various versions of Windows, including Windows 7. Etern-Blue-Windows-7-Checker will basically send SMB packets to a host to see if that Windows host machine is vulnerable to the EternalBlue exploit (CVE-2017-0143).
Based on https://github.com/REPTILEHAUS/Eternal-Blue/blob/master/checker.py
文件快照
[4.0K] /data/pocs/11c1beae3b7a2449aa10a0089359e2feb691b39e
├── [183K] a.out
├── [6.2K] bucket.cpp
├── [1.7K] bucket.h
├── [ 470] build.bat
├── [ 187] build.sh
├── [ 28K] main.cpp
├── [2.4K] marray.cpp
├── [ 979] marray.h
├── [ 13K] maths.h
├── [1.8K] nix_socket.cpp
├── [ 239] nix_socket.h
├── [2.7K] nix_threading.cpp
├── [ 795] nix_threading.h
├── [3.3K] queue.cpp
├── [ 943] queue.h
├── [ 396] README.md
├── [4.0K] required
│ ├── [ 298] assert.h
│ ├── [4.3K] intrinsic.h
│ ├── [4.2K] memory.cpp
│ ├── [1.1K] memory.h
│ ├── [ 231] nix.cpp
│ ├── [ 190] nix.h
│ └── [ 192] platform.h
├── [ 51] sample_smb_negotiate.raw
├── [ 131] sample_smb_response.raw
├── [ 147] sample_smb_setupXAndReq_auth_user.raw
├── [1.9K] socket.cpp
├── [ 616] socket.h
├── [ 16K] stringz.cpp
├── [2.1K] stringz.h
├── [ 217] test_packet.raw
├── [ 131] test_recvpacket.raw
├── [ 525] threads.h
├── [ 283] token.cpp
└── [ 357] token.h
1 directory, 35 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。