https://github.com/linuxuser255/ms17-010_explained
This repo is a deep-dive into the Eternal Blue buffer overflow attack, included is the exploit source code, and extensive documentation.
https://github.com/linuxuser255/ms17-010_explained
buffer-overflow-attack exploit linux python windows
Last synced: 4 months ago
JSON representation
This repo is a deep-dive into the Eternal Blue buffer overflow attack, included is the exploit source code, and extensive documentation.
- Host: GitHub
- URL: https://github.com/linuxuser255/ms17-010_explained
- Owner: LinuxUser255
- Created: 2020-10-30T19:01:02.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2022-04-14T16:21:13.000Z (about 3 years ago)
- Last Synced: 2025-01-10T19:28:34.207Z (5 months ago)
- Topics: buffer-overflow-attack, exploit, linux, python, windows
- Language: Python
- Homepage:
- Size: 3.09 MB
- Stars: 0
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README

# MS17-010_explained
#### For technical analisys purposes, I slightly edited the original eternalblue_exploit7.py
#### and named it: MS17-010_Analyzed.py
---
This repo provides both a high overview of MS17-010, as well as an indepth technical analysis. I included a slide explaining the SMB protocol for context, then explanaitions of the three bugs, the pseudo code of Window's vulnerable source code, the chain of events, and lastly, my breakdown of the Python exploit source code and how it sequentially, exploits each of the three bugs.The code sequence slides are mine, the other illustrations were taken from
https://research.checkpoint.com/2017/eternalblue-everything-know/