https://github.com/vaneeza-7/eternal-blue-exploit
MS17-010 Eternal Blue SMB Remote Windows Kernel Pool Corruption Vulnerability exploited step by step
https://github.com/vaneeza-7/eternal-blue-exploit
eternalblue ms17-010
Last synced: 3 months ago
JSON representation
MS17-010 Eternal Blue SMB Remote Windows Kernel Pool Corruption Vulnerability exploited step by step
- Host: GitHub
- URL: https://github.com/vaneeza-7/eternal-blue-exploit
- Owner: Vaneeza-7
- License: mit
- Created: 2025-01-24T15:01:29.000Z (9 months ago)
- Default Branch: main
- Last Pushed: 2025-01-24T15:31:42.000Z (9 months ago)
- Last Synced: 2025-03-23T05:12:50.237Z (7 months ago)
- Topics: eternalblue, ms17-010
- Homepage:
- Size: 1.82 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Eternal Blue Exploitation (Step by Step)
This repository covers the vulnerability assessment for Windows 7 operating system. The vulnerability is identified as **Eternal Blue (MS17-010 Eternal Blue SMB Remote Windows Kernel Pool Corruption)** with **CVE-2017-0144**.
It is a critical security vulnerability in the **SMBv1 (Server Message Block version 1)** protocol on Windows operating systems, which allows remote attackers to exploit Windows machines by causing kernel pool corruption. Eternal blue targets a flaw in SMBv1 and this will allow attackers to remotely execute code on systems without authentication.
In order to secure the systems, immediately disable SMBv1 and install patched versions of Windows. Microsoft released a patch in March 2017 to fix the vulnerability (MS17-010).