POC详情: 11c1beae3b7a2449aa10a0089359e2feb691b39e

来源
关联漏洞
标题: Microsoft Windows SMB 输入验证错误漏洞 (CVE-2017-0143)
描述:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。SMBv1 server是其中的一个服务器协议组件。 Microsoft Windows中的SMBv1服务器存在远程代码执行漏洞。远程攻击者可借助特制的数据包利用该漏洞执行任意代码。以下版本受到影响:Microsoft Windows Vista SP2,Windows Server 2008 SP2和R2 SP1,Windows 7 SP1,Windows 8.1,Windows Server 2012 Gold
描述
EternalBlue is a well-known SMB exploit created by the NSA to attack various versions of Windows, including Windows 7. Etern-Blue-Windows-7-Checker will basically send SMB packets to a host to see if that Windows host machine is vulnerable to the EternalBlue exploit (CVE-2017-0143).
介绍
# Eternal-blue-Windows-7-Checker

EternalBlue is a well-known SMB exploit created by the NSA to attack various versions of Windows, including Windows 7. Etern-Blue-Windows-7-Checker will basically send SMB packets to a host to see if that Windows host machine is vulnerable to the EternalBlue exploit (CVE-2017-0143).


Based on https://github.com/REPTILEHAUS/Eternal-Blue/blob/master/checker.py
文件快照

[4.0K] /data/pocs/11c1beae3b7a2449aa10a0089359e2feb691b39e ├── [183K] a.out ├── [6.2K] bucket.cpp ├── [1.7K] bucket.h ├── [ 470] build.bat ├── [ 187] build.sh ├── [ 28K] main.cpp ├── [2.4K] marray.cpp ├── [ 979] marray.h ├── [ 13K] maths.h ├── [1.8K] nix_socket.cpp ├── [ 239] nix_socket.h ├── [2.7K] nix_threading.cpp ├── [ 795] nix_threading.h ├── [3.3K] queue.cpp ├── [ 943] queue.h ├── [ 396] README.md ├── [4.0K] required │   ├── [ 298] assert.h │   ├── [4.3K] intrinsic.h │   ├── [4.2K] memory.cpp │   ├── [1.1K] memory.h │   ├── [ 231] nix.cpp │   ├── [ 190] nix.h │   └── [ 192] platform.h ├── [ 51] sample_smb_negotiate.raw ├── [ 131] sample_smb_response.raw ├── [ 147] sample_smb_setupXAndReq_auth_user.raw ├── [1.9K] socket.cpp ├── [ 616] socket.h ├── [ 16K] stringz.cpp ├── [2.1K] stringz.h ├── [ 217] test_packet.raw ├── [ 131] test_recvpacket.raw ├── [ 525] threads.h ├── [ 283] token.cpp └── [ 357] token.h 1 directory, 35 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。