MS17-010 Vulnerability - Over the WAN LAB with NGROK - EternalBlue and EternalRomance exploits on Windows 10, Windows 7 and Windows 2018 R2

In this video we will use the "Over the WAN" LAB that was configured in the previous post, in order to exploit the MS17-010 Vulnerability.
We will use the EternalBlue and EternalRomance / EternalChampion exploit modules in Metasploit, together with NGROK.

This video will heavily use information that was presented in my previous posts. Please review the posts below, as needed:

1. Over the WAN Penetration Testing LAB - Installing and using NGROK and NETCAT

2. MS17-010 Vulnerability - Scanning using Metasploit on KALI Linux

3. MS17-010 Vulnerability - Using EternalBlue exploit module in Metasploit

4. Metasploit Tips - reverse_https vs reverse_tcp payloads (also covers the "multihandler" exploit)

5. MS17-010 Vulnerability - New EternalRomance / EternalSynergy / EternalChampion SMB modules for Metasploit - Exploiting Windows10 and Windows2008R2

STDAPI

In order to be able to use the "sysinfo", "getuid" and "ipconfig" commands in Meterpreter, the "stdapi" module will have to be loaded first, by using the command below:

load stdapi

MS17-010 Vulnerability - Over the WAN LAB with NGROK - EternalBlue and EternalRomance exploits on Windows 10, Windows 7 and Windows 2018 R2


Comments

  1. I really appropriate this page. Very Nice!

    ReplyDelete
  2. thank you very much sir for your hard efforts please keep-up the giving u r a bless

    ReplyDelete

Post a comment

Popular Posts

MS17-010 Vulnerability - Using EternalBlue exploit module in Metasploit

Generating shellcode - using msfvenom to generate a binary payload

MS17-010 Vulnerability - Scanning using Metasploit on KALI Linux