![](https://static.wixstatic.com/media/642e54_274d40ece1d44ad3be0262970c337ddd~mv2.png/v1/fill/w_980,h_357,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/642e54_274d40ece1d44ad3be0262970c337ddd~mv2.png)
Begining The Scan
To begin we will run Metasploit
Search for exploit
We will the use the search command, to look for eternalblue
Once Metasploit is done returning the results of our search, we will use the auxiliary/scanner/smb/smb_ms17_010 to scan the target machine to see if it was vulnerable.
How To Execute Command
To begin we will check what options we have. To do this we can run the show options commmand.
All we have to do next was to set the RHOSTS to the tagets IP.
With everything set, we are able to proceed with running the run command
As shown the tagets machine is likely vulnerable to MS17-010! It has also outputted what version the operating system the target machine is running.
Exploiting
That we know the targets machine is likely vulnerable, we can now proceed to use exploit/windows/smb/ms17_010_eternalblue. To do this we will open metasploit again and run the following:
As previous we will then use the show options command and set the options needed before running the exploit.
Perfect! Now with everything set, we can now execute the exploit command to try and gain access into the machine.
We can check this exploit ran correctly by simply typing the sysinfo command
We have done it! we have succesfully gain access into the windows 7 machine via eternalblue.
For more information you can read up on eternalblue here
Hashtags
#hacking #hacker #cybersecurity #ethicalhacking #hackers #linux #programming #hack #technology #kalilinux #security #coding #infosec #python #tech #hackingtools #ethicalhacker #pentesting #cyber #malware #programmer #computerscience #cybercrime #cyberattack #informationsecurity #hacked #anonymous #cybersecurityawareness #coder #metasploit #Nmap #Networking #exploits
Comments