5/1/2023 0 Comments A better finder rename 10.40Searchsploit is a command line search tool for Exploit Database. I use Searchsploit to check if there is any known exploit. In 2017, WannaCry – a crypto-ransomware – used the EternalBlue exploit which spread itself across the network infecting all connected devices. Malware that utilises EternalBlue can propagate across networks. The exploit can compromise the entire network and devices connected to it. It exploits a vulnerability in the Windows OS SMB protocol. This vulnerability was patched and is listed on Microsoft’s Security Bulletin as MS17-010.ĮternalBlue allows hackers to remotely execute arbitrary code to gain access to a network. It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability - Wikipedia What is ms17-010? EternalBlue is a cyberattack exploit developed by the U.S. We can see that the box is vulnerable to a Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010). I use an nmap script to verify this information with the following: nmap -script vuln -p 445 blue.htb The Server Message Block (SMB) is a network protocol that enables users to communicate with remote computers and servers in order to use their resources or share, open, and edit files.įrom the name of this box and that it's a Windows machine with port 445 opened, we can assume the machine is vulnerable to EternalBlue. Port 445, Microsoft-DS (Directory Services) SMB file sharingįrom the nmap scan, we have some information concerning the computer name (haris-PC) and the SMB version (2.02). We can see that there are quite a few open ports including: If you find the results a little bit too overwhelming, you can try this: nmap blue.htb A: Enables OS detection, version detection, script scanning, and traceroute I use the following command to perform an intensive scan: nmap -A -v blue.htb If you want to learn more about it, you can have a look at the documentation here. There are many commands you can use with this tool to scan the network. It uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap is a free and open source utility for network discovery and security auditing. It is always better to spend more time on this phase to get as much information as you can. This is one of the most important parts as it will determine what you can try to exploit afterwards. The first step before exploiting a machine is to do a little bit of scanning and reconnaissance. With 10.10.10.40 blue.htb Step 1 - Reconnaissance We will use the following tools to pawn the box on a Kali Linux box:įirst, I add Blue on the /etc/hosts file. But it demonstrates the impact of the EternalBlue exploit, which has been used to compromise companies through large-scale ransomware and crypto-mining attacks. Note: Only write-ups of retired HTB machines are allowed.īlue is one of the simplest machines on Hack The Box. Some of them simulate real world scenarios and some of them lean more towards a CTF style of challenge. It contains several challenges that are constantly updated. Hack The Box (HTB) is an online platform that allows you to test your penetration testing skills.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |