Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2017-0143

Description

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.

POC

Reference

- http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html

- http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html

- https://www.exploit-db.com/exploits/41891/

- https://www.exploit-db.com/exploits/41987/

- https://www.exploit-db.com/exploits/43970/

Github

- https://github.com/000Sushant/hacking_windows7_using_metasploit

- https://github.com/0xCyberSleuth/0xCyberSleuth

- https://github.com/0xCyberSleuth/Cybersecurity-VAPT-Capstone

- https://github.com/15866095848/15866095848

- https://github.com/4n0nym0u5dk/MS17-010_CVE-2017-0143

- https://github.com/90l3m0np13/Server-2012

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Abhishek9911-bit/Internship-Task-3-Elevate-Labs

- https://github.com/Acosta27/blue_writeup

- https://github.com/Al1ex/WindowsElevation

- https://github.com/AlienTec1908/Zero_HackMyVM_Easy

- https://github.com/AntonioPC94/Blue

- https://github.com/AntonioPC94/Ice

- https://github.com/ArcadeHustle/X3_USB_softmod

- https://github.com/ArminToric28/EternalBlue-Exploit

- https://github.com/Ascotbe/Kernelhub

- https://github.com/AtithKhawas/autoblue

- https://github.com/BengaminButton/XILLEN-Vulnerability-Scanner

- https://github.com/Cedric-Martz/EthernalBlue_report

- https://github.com/Certifiedhustler-Swaba/VulnerableGPT

- https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections

- https://github.com/Cruxer8Mech/Idk

- https://github.com/CyberMarcR/Metasploit-EternalBlue

- https://github.com/Cyberwatch/cyberwatch_api_powershell

- https://github.com/DJumanto/dummymodulerecon

- https://github.com/Drevon-Shaw/Basic-Pentesting-Lab

- https://github.com/EhmaanShafqat96/Vulnerability-Assessment-of-Metasploitable-using-Nmap-and-Nikto

- https://github.com/ErdemOzgen/ActiveDirectoryAttacks

- https://github.com/Esther7171/Ice

- https://github.com/Esther7171/THM-Walkthroughs

- https://github.com/Ghebriou/platform_pfe

- https://github.com/GhostTroops/scan4all

- https://github.com/Guccifer808/doublepulsar-scanner-golang

- https://github.com/H3xL00m/MS17-010_CVE-2017-0143

- https://github.com/HacTF/poc--exp

- https://github.com/HattMobb/TryHackMe-Relevant-Machine-Writeup-Walkthrough

- https://github.com/InTheDarkness2102/CVE-2017-0143-MS-17-010-EternalBlue

- https://github.com/JFR-C/Boot2root-CTFs-Writeups

- https://github.com/JMCumbrera/TryHackMe-Blue-WriteUp

- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups

- https://github.com/Juba0x4355/Blue-THM

- https://github.com/Juba0x4355/Blue-Writeup

- https://github.com/Kiosec/Windows-Exploitation

- https://github.com/Kiz619ao630/StepwisePolicy3

- https://github.com/Larry-Wilkes-CyberCloud/Nessus-Scans

- https://github.com/Lynk4/Windows-Server-2008-VAPT

- https://github.com/Mafiosohack/offensive-security-lab-1

- https://github.com/Maheshwarip28/Task-3

- https://github.com/Micr067/Pentest_Note

- https://github.com/MinYoungLeeDev/Attack-Defense-Analysis-of-a-Vulnerable-Network

- https://github.com/MrShadow009/vulnerability-scan-task

- https://github.com/N3rdyN3xus/MS17-010_CVE-2017-0143

- https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker

- https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense

- https://github.com/NoelBradford/Windows11-Hardening-Powershell-Scripts

- https://github.com/NyxByt3/MS17-010_CVE-2017-0143

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PWN-Kingdom/Eternal-Scan

- https://github.com/PWN-Kingdom/Test_Tasks

- https://github.com/PauloPrino/CrewAI-Hacking

- https://github.com/PrathamDeora/windows7-ms17-010-Practical--Task-

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/R-Vision/ms17-010

- https://github.com/R0B1NL1N/AD-Attack-Defense

- https://github.com/Raj-h-hacker/GPT_Vuln-analyzer

- https://github.com/Raju-Thulluri/Task-3

- https://github.com/Ratlesv/Scan4all

- https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API

- https://github.com/Ruturaj3012/vul

- https://github.com/SampatDhakal/Metasploit-Attack-Report

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries

- https://github.com/SoLuckyMan/MaxPatrolSIEM

- https://github.com/Sp3c73rSh4d0w/MS17-010_CVE-2017-0143

- https://github.com/SyedAfzalHussain/network-security-scanner

- https://github.com/TheLastochka/pentest

- https://github.com/Totes5706/TotesHTB

- https://github.com/UNO-Babb/CYBR1100

- https://github.com/Vaneshik/NTO2022

- https://github.com/Waxweasle/TryHackMe-Relevant-Pen-Test-Walkthrough

- https://github.com/Whiteh4tWolf/Attack-Defense

- https://github.com/X-The-Mystic/xframe

- https://github.com/Ygodsec/-

- https://github.com/ZTK-009/Aggressor

- https://github.com/ZTK-009/Ladon

- https://github.com/ZTK-009/PowerLadon

- https://github.com/ZayDesGarcon/MS17-010-Exploit-Lab

- https://github.com/Zeyad-Azima/Remedy4me

- https://github.com/ZyberPatrol/Active-Directory

- https://github.com/a1xbit/BlackBoxPenetrationTesting

- https://github.com/aditya-0211/penetration-testing

- https://github.com/androidkey/MS17-011

- https://github.com/avboy1337/Vulnerabilities

- https://github.com/avergnaud/nmap

- https://github.com/avergnaud/thm-notes

- https://github.com/aymankhder/AD-attack-defense

- https://github.com/basimnawaz6/EternalBlue-Lab

- https://github.com/bb33bb/Vulnerabilities

- https://github.com/benguelmas/cve-2017-0143

- https://github.com/bhataasim1/AD-Attack-Defence

- https://github.com/blackend/Diario-RedTem

- https://github.com/boss-net/goscan

- https://github.com/bzynczy-chrobok/sda_project_02

- https://github.com/c0d3cr4f73r/MS17-010_CVE-2017-0143

- https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode

- https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode

- https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag-

- https://github.com/chaao195/EBEKv2.0

- https://github.com/chanderson-silva/Pentest-Guide

- https://github.com/crypticdante/MS17-010_CVE-2017-0143

- https://github.com/czq945659538/-study

- https://github.com/d4t4s3c/Win7Blue

- https://github.com/dhavaldp206/EL_Task3

- https://github.com/drg3nz0/gpt-analyzer

- https://github.com/dvanmosselbeen/TryHackMe_writeups

- https://github.com/ericjiang97/SecScripts

- https://github.com/fdff87554/Cycraft-Interview-Project-2022

- https://github.com/fei9747/WindowsElevation

- https://github.com/geeksniper/active-directory-pentest

- https://github.com/ginapalomo/ScanAll

- https://github.com/giterlizzi/secdb-feeds

- https://github.com/gremlin-0x/thm_relevant

- https://github.com/gwyomarch/Legacy-HTB-Writeup-FR

- https://github.com/h3x0v3rl0rd/MS17-010

- https://github.com/h3x0v3rl0rd/MS17-010_CVE-2017-0143

- https://github.com/h3xcr4ck3r/MS17-010_CVE-2017-0143

- https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense-

- https://github.com/heruidong/scan4all

- https://github.com/hkranshi/CNS

- https://github.com/hktalent/scan4all

- https://github.com/homjxi0e/Script-nmap-scan-ms17-010

- https://github.com/ihebski/A-Red-Teamer-diaries

- https://github.com/infosecn1nja/AD-Attack-Defense

- https://github.com/itscio/Aggressor

- https://github.com/jaimewaltonn/eJPTv2

- https://github.com/jeredbare/ms17-010_to_slack

- https://github.com/jimrtyler/Ghost

- https://github.com/k4u5h41/MS17-010_CVE-2017-0143

- https://github.com/k8gege/Aggressor

- https://github.com/k8gege/Ladon

- https://github.com/k8gege/PowerLadon

- https://github.com/keshavskn123/CDAC

- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups

- https://github.com/kiranjpjk/Penetration-Testing-VMs-and-Web

- https://github.com/liorsivan/hackthebox-machines

- https://github.com/lnick2023/nicenice

- https://github.com/lyshark/Windows-exploits

- https://github.com/mchklt/PFE

- https://github.com/merlinepedra/SCAN4LL

- https://github.com/merlinepedra25/SCAN4ALL-1

- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense

- https://github.com/morpheuslord/GPT_Vuln-analyzer

- https://github.com/mynameisv/MMSBGA

- https://github.com/n0-traces/cve_monitor

- https://github.com/n3rdh4x0r/MS17-010

- https://github.com/n3rdh4x0r/MS17-010_CVE-2017-0143

- https://github.com/nadeemali79/AD-Attack-Defense

- https://github.com/naotty/tryhackme

- https://github.com/nirsarkar/scan4all

- https://github.com/nonameyo/ThreatIntel-Barque

- https://github.com/notsag-dev/htb-legacy

- https://github.com/nzelyn/GPT_Vuln-analyzer

- https://github.com/omkalyankar/Network-Scanning-and-Vulnerability-Assessment

- https://github.com/p0pp3t0n/MS17-010-Dockerfile

- https://github.com/paramint/AD-Attack-Defense

- https://github.com/pedro-canafistula/Auditoria-de-Seguranca-com-OpenVas

- https://github.com/program-smith/THM-Blue

- https://github.com/puckiestyle/A-Red-Teamer-diaries

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/ramyardaneshgar/OpenVas

- https://github.com/ramyardaneshgar/THM-Writeup-OpenVas

- https://github.com/retr0-13/AD-Attack-Defense

- https://github.com/roomkangali/DursVulnNSE

- https://github.com/rosonsec/Exploits

- https://github.com/santhosheyzz/Basic-Vulnerability-Scan-Pc

- https://github.com/seedon198/Shodan-AIO

- https://github.com/seeu-inspace/easyg

- https://github.com/sponkmonk/Ladon_english_update

- https://github.com/stormblack/smbvuln

- https://github.com/substing/blue_ctf

- https://github.com/sunylife24/TryHackMe2

- https://github.com/sunzu94/AD-Attack-Defense

- https://github.com/superhero1/OSCP-Prep

- https://github.com/sv3nbeast/Attack-Notes

- https://github.com/syedfaizan9920/nmap-vulnerability-scan-windows7

- https://github.com/tamilselvan-cs/Task3-Vulnerability-scan

- https://github.com/tataev/Security

- https://github.com/tempiltin/active-directory_pentest

- https://github.com/trhacknon/scan4all

- https://github.com/tufanturhan/Red-Teamer-Diaries

- https://github.com/uroboros-security/SMB-CVE

- https://github.com/valarauco/wannafind

- https://github.com/vkhalaim/Relevant---Penetration-Testing-Challenge-Solution-

- https://github.com/w3security/goscan

- https://github.com/wateroot/poc-exp

- https://github.com/willamygarcia/Vuln_Windows_7_11

- https://github.com/wrlu/Vulnerabilities

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xiaoy-sec/Pentest_Note

- https://github.com/xthemystik/xframe

- https://github.com/ycdxsb/Exploits

- https://github.com/ycdxsb/WindowsPrivilegeEscalation

- https://github.com/yeriej77/Identifying-and-Exploiting-Vulnerabilities

- https://github.com/yeshwanthp999/Windows7-ms17-010-

- https://github.com/zhang040723/web

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zimmel15/HTBBlueWriteup

- https://github.com/zulloper/cve-poc