### [CVE-2017-0144](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0144) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20SMB&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brighgreen) ### Description The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. ### POC #### Reference - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - https://www.exploit-db.com/exploits/41891/ - https://www.exploit-db.com/exploits/41987/ - https://www.exploit-db.com/exploits/42030/ - https://www.exploit-db.com/exploits/42031/ #### Github - https://github.com/0xAbbarhSF/Termux-Nation-2022-Alpha - https://github.com/0xsyr0/OSCP - https://github.com/61106960/adPEAS - https://github.com/ARPSyndicate/cvemon - https://github.com/Ali-Imangholi/EternalBlueTrojan - https://github.com/AnugiArrawwala/CVE-Research - https://github.com/Astrogeorgeonethree/Starred - https://github.com/Astrogeorgeonethree/Starred2 - https://github.com/Atem1988/Starred - https://github.com/ByteX7/RansomGuard - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections - https://github.com/CodeWithSurya/-awesome-termux-hacking - https://github.com/Cruxer8Mech/Idk - https://github.com/Cyberwatch/cyberwatch_api_powershell - https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution - https://github.com/ErdemOzgen/ActiveDirectoryAttacks - https://github.com/Frat1n/Escalibur_Framework - https://github.com/FutureComputing4AI/ClarAVy - https://github.com/GhostTroops/TOP - https://github.com/GhostTroops/scan4all - https://github.com/GoDsUnReAL/fun - https://github.com/Guccifer808/doublepulsar-scanner-golang - https://github.com/Itz-Ayanokoji/All-in-one-termux-tools - https://github.com/JERRY123S/all-poc - https://github.com/JeffEmrys/termux- - https://github.com/K1ngDamien/epss-super-sorter - https://github.com/Kiz619ao630/StepwisePolicy3 - https://github.com/Kuromesi/Py4CSKG - https://github.com/LinuxUser255/Python_Penetration_Testing - https://github.com/Lynk4/Windows-Server-2008-VAPT - https://github.com/MarikalAbhijeet/PentestReport - https://github.com/Monsterlallu/Agori-Baba - https://github.com/Monsterlallu/Cyber-Kunjaali - https://github.com/Monsterlallu/Top-500-hacking-tools - https://github.com/NeuromorphicComputationResearchProgram/ClarAVy - https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/PWN-Kingdom/Test_Tasks - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups - https://github.com/Project-WARMIND/Exploit-Modules - https://github.com/QWERTSKIHACK/awesome-termux-hacking - https://github.com/R-Vision/ms17-010 - https://github.com/R0B1NL1N/AD-Attack-Defense - https://github.com/Ratlesv/Scan4all - https://github.com/RedYetiDev/RedYetiDev - https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API - https://github.com/SaintsConnor/Exploits - https://github.com/SenukDias/OSCP_cheat - https://github.com/ShubhamGuptaIN/WannaCry-ransomware-attack-Virus - https://github.com/SirElmard/ethical_hacking - https://github.com/Totes5706/TotesHTB - https://github.com/UNO-Babb/CYBR1100 - https://github.com/Whiteh4tWolf/Attack-Defense - https://github.com/Zeyad-Azima/Remedy4me - https://github.com/ZyberPatrol/Active-Directory - https://github.com/almalikzakwan/Lemon-DuckAnalysis - https://github.com/androidkey/MS17-011 - https://github.com/aseams/Pentest-Toolkit - https://github.com/aymankhder/AD-attack-defense - https://github.com/bhataasim1/AD-Attack-Defence - https://github.com/c0mrade12211/Pentests - https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode - https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode - https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag- - https://github.com/chaao195/EBEKv2.0 - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/d0n601/Pentest-Cheat-Sheet - https://github.com/d4redevilx/eJPT-notes - https://github.com/d4redevilx/eJPTv2-notes - https://github.com/diyarit/Ad-Peas - https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144 - https://github.com/ericjiang97/SecScripts - https://github.com/fernandopaezmartin/SAD_2021--Metasploit - https://github.com/geeksniper/active-directory-pentest - https://github.com/ginapalomo/ScanAll - https://github.com/giterlizzi/secdb-feeds - https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense- - https://github.com/haginara/msrc-python - https://github.com/himera25/termux-hacking - https://github.com/hktalent/TOP - https://github.com/hktalent/bug-bounty - https://github.com/hktalent/scan4all - https://github.com/infosecn1nja/AD-Attack-Defense - https://github.com/jbmihoub/all-poc - https://github.com/joyce8/MalDICT - https://github.com/just0rg/Security-Interview - https://github.com/k8gege/Aggressor - https://github.com/k8gege/Ladon - https://github.com/k8gege/PowerLadon - https://github.com/kdcloverkid/https-github.com-kdcloverkid-awesome-termux-hacking - https://github.com/kgwanjala/oscp-cheatsheet - https://github.com/kimocoder/eternalblue - https://github.com/linghaomeng/YBYB-590-capstone - https://github.com/lnick2023/nicenice - https://github.com/may215/awesome-termux-hacking - https://github.com/merlinepedra/SCAN4LL - https://github.com/merlinepedra25/SCAN4ALL-1 - https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense - https://github.com/nadeemali79/AD-Attack-Defense - https://github.com/naufalazhar65/ETHICAL-HACKING-DOCS - https://github.com/nenandjabhata/CTFs-Journey - https://github.com/nirsarkar/scan4all - https://github.com/oscpname/OSCP_cheat - https://github.com/osogi/NTO_2022 - https://github.com/paramint/AD-Attack-Defense - https://github.com/peterpt/eternal_scanner - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/quynhold/Detect-CVE-2017-0144-attack - https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs - https://github.com/retr0-13/AD-Attack-Defense - https://github.com/revanmalang/OSCP - https://github.com/rvsvishnuv/rvsvishnuv.github.io - https://github.com/shubhamg0sai/All_top_500_hacking_tool - https://github.com/skeeperloyaltie/network - https://github.com/skhjacksonheights/bestTermuxTools_skh - https://github.com/sponkmonk/Ladon_english_update - https://github.com/starlingvibes/TryHackMe - https://github.com/sunzu94/AD-Attack-Defense - https://github.com/sworatz/toolx500 - https://github.com/tataev/Security - https://github.com/trhacknon/scan4all - https://github.com/txuswashere/OSCP - https://github.com/uroboros-security/SMB-CVE - https://github.com/w3security/goscan - https://github.com/weeka10/-hktalent-TOP - https://github.com/witblack/G3nius-Tools-Sploit - https://github.com/wuvel/TryHackMe - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xhref/OSCP - https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/yzk0b/TERMUX-RD - https://github.com/zorikcherfas/eternalblue_linux_cpp