### [CVE-2017-0143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20SMB&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=The%20SMBv1%20server%20in%20Microsoft%20Windows%20Vista%20SP2%3B%20Windows%20Server%202008%20SP2%20and%20R2%20SP1%3B%20Windows%207%20SP1%3B%20Windows%208.1%3B%20Windows%20Server%202012%20Gold%20and%20R2%3B%20Windows%20RT%208.1%3B%20and%20Windows%2010%20Gold%2C%201511%2C%20and%201607%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen) ### Description The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. ### POC #### Reference - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - https://www.exploit-db.com/exploits/41891/ - https://www.exploit-db.com/exploits/41987/ - https://www.exploit-db.com/exploits/43970/ #### Github - https://github.com/000Sushant/hacking_windows7_using_metasploit - https://github.com/0xCyberSleuth/0xCyberSleuth - https://github.com/0xCyberSleuth/Cybersecurity-VAPT-Capstone - https://github.com/15866095848/15866095848 - https://github.com/4n0nym0u5dk/MS17-010_CVE-2017-0143 - https://github.com/90l3m0np13/Server-2012 - https://github.com/ARPSyndicate/cvemon - https://github.com/Abhishek9911-bit/Internship-Task-3-Elevate-Labs - https://github.com/Acosta27/blue_writeup - https://github.com/Al1ex/WindowsElevation - https://github.com/AlienTec1908/Zero_HackMyVM_Easy - https://github.com/AntonioPC94/Blue - https://github.com/AntonioPC94/Ice - https://github.com/ArcadeHustle/X3_USB_softmod - https://github.com/ArminToric28/EternalBlue-Exploit - https://github.com/Ascotbe/Kernelhub - https://github.com/AtithKhawas/autoblue - https://github.com/BengaminButton/XILLEN-Vulnerability-Scanner - https://github.com/Cedric-Martz/EthernalBlue_report - https://github.com/Certifiedhustler-Swaba/VulnerableGPT - https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections - https://github.com/Cruxer8Mech/Idk - https://github.com/CyberMarcR/Metasploit-EternalBlue - https://github.com/Cyberwatch/cyberwatch_api_powershell - https://github.com/DJumanto/dummymodulerecon - https://github.com/Drevon-Shaw/Basic-Pentesting-Lab - https://github.com/EhmaanShafqat96/Vulnerability-Assessment-of-Metasploitable-using-Nmap-and-Nikto - https://github.com/ErdemOzgen/ActiveDirectoryAttacks - https://github.com/Esther7171/Ice - https://github.com/Esther7171/THM-Walkthroughs - https://github.com/Ghebriou/platform_pfe - https://github.com/GhostTroops/scan4all - https://github.com/Guccifer808/doublepulsar-scanner-golang - https://github.com/H3xL00m/MS17-010_CVE-2017-0143 - https://github.com/HacTF/poc--exp - https://github.com/HattMobb/TryHackMe-Relevant-Machine-Writeup-Walkthrough - https://github.com/InTheDarkness2102/CVE-2017-0143-MS-17-010-EternalBlue - https://github.com/JFR-C/Boot2root-CTFs-Writeups - https://github.com/JMCumbrera/TryHackMe-Blue-WriteUp - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups - https://github.com/Juba0x4355/Blue-THM - https://github.com/Juba0x4355/Blue-Writeup - https://github.com/Kiosec/Windows-Exploitation - https://github.com/Kiz619ao630/StepwisePolicy3 - https://github.com/Larry-Wilkes-CyberCloud/Nessus-Scans - https://github.com/Lynk4/Windows-Server-2008-VAPT - https://github.com/Mafiosohack/offensive-security-lab-1 - https://github.com/Maheshwarip28/Task-3 - https://github.com/Micr067/Pentest_Note - https://github.com/MinYoungLeeDev/Attack-Defense-Analysis-of-a-Vulnerable-Network - https://github.com/MrShadow009/vulnerability-scan-task - https://github.com/N3rdyN3xus/MS17-010_CVE-2017-0143 - https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker - https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense - https://github.com/NoelBradford/Windows11-Hardening-Powershell-Scripts - https://github.com/NyxByt3/MS17-010_CVE-2017-0143 - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/PWN-Kingdom/Eternal-Scan - https://github.com/PWN-Kingdom/Test_Tasks - https://github.com/PauloPrino/CrewAI-Hacking - https://github.com/PrathamDeora/windows7-ms17-010-Practical--Task- - https://github.com/PuddinCat/GithubRepoSpider - https://github.com/R-Vision/ms17-010 - https://github.com/R0B1NL1N/AD-Attack-Defense - https://github.com/Raj-h-hacker/GPT_Vuln-analyzer - https://github.com/Raju-Thulluri/Task-3 - https://github.com/Ratlesv/Scan4all - https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API - https://github.com/Ruturaj3012/vul - https://github.com/SampatDhakal/Metasploit-Attack-Report - https://github.com/SexyBeast233/SecBooks - https://github.com/Singhsanjeev617/A-Red-Teamer-diaries - https://github.com/SoLuckyMan/MaxPatrolSIEM - https://github.com/Sp3c73rSh4d0w/MS17-010_CVE-2017-0143 - https://github.com/SyedAfzalHussain/network-security-scanner - https://github.com/TheLastochka/pentest - https://github.com/Totes5706/TotesHTB - https://github.com/UNO-Babb/CYBR1100 - https://github.com/Vaneshik/NTO2022 - https://github.com/Waxweasle/TryHackMe-Relevant-Pen-Test-Walkthrough - https://github.com/Whiteh4tWolf/Attack-Defense - https://github.com/X-The-Mystic/xframe - https://github.com/Ygodsec/- - https://github.com/ZTK-009/Aggressor - https://github.com/ZTK-009/Ladon - https://github.com/ZTK-009/PowerLadon - https://github.com/ZayDesGarcon/MS17-010-Exploit-Lab - https://github.com/Zeyad-Azima/Remedy4me - https://github.com/ZyberPatrol/Active-Directory - https://github.com/a1xbit/BlackBoxPenetrationTesting - https://github.com/aditya-0211/penetration-testing - https://github.com/androidkey/MS17-011 - https://github.com/avboy1337/Vulnerabilities - https://github.com/avergnaud/nmap - https://github.com/avergnaud/thm-notes - https://github.com/aymankhder/AD-attack-defense - https://github.com/basimnawaz6/EternalBlue-Lab - https://github.com/bb33bb/Vulnerabilities - https://github.com/benguelmas/cve-2017-0143 - https://github.com/bhataasim1/AD-Attack-Defence - https://github.com/blackend/Diario-RedTem - https://github.com/boss-net/goscan - https://github.com/bzynczy-chrobok/sda_project_02 - https://github.com/c0d3cr4f73r/MS17-010_CVE-2017-0143 - https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode - https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode - https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag- - https://github.com/chaao195/EBEKv2.0 - https://github.com/chanderson-silva/Pentest-Guide - https://github.com/crypticdante/MS17-010_CVE-2017-0143 - https://github.com/czq945659538/-study - https://github.com/d4t4s3c/Win7Blue - https://github.com/dhavaldp206/EL_Task3 - https://github.com/drg3nz0/gpt-analyzer - https://github.com/dvanmosselbeen/TryHackMe_writeups - https://github.com/ericjiang97/SecScripts - https://github.com/fdff87554/Cycraft-Interview-Project-2022 - https://github.com/fei9747/WindowsElevation - https://github.com/geeksniper/active-directory-pentest - https://github.com/ginapalomo/ScanAll - https://github.com/giterlizzi/secdb-feeds - https://github.com/gremlin-0x/thm_relevant - https://github.com/gwyomarch/Legacy-HTB-Writeup-FR - https://github.com/h3x0v3rl0rd/MS17-010 - https://github.com/h3x0v3rl0rd/MS17-010_CVE-2017-0143 - https://github.com/h3xcr4ck3r/MS17-010_CVE-2017-0143 - https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense- - https://github.com/heruidong/scan4all - https://github.com/hkranshi/CNS - https://github.com/hktalent/scan4all - https://github.com/homjxi0e/Script-nmap-scan-ms17-010 - https://github.com/ihebski/A-Red-Teamer-diaries - https://github.com/infosecn1nja/AD-Attack-Defense - https://github.com/itscio/Aggressor - https://github.com/jaimewaltonn/eJPTv2 - https://github.com/jeredbare/ms17-010_to_slack - https://github.com/jimrtyler/Ghost - https://github.com/k4u5h41/MS17-010_CVE-2017-0143 - https://github.com/k8gege/Aggressor - https://github.com/k8gege/Ladon - https://github.com/k8gege/PowerLadon - https://github.com/keshavskn123/CDAC - https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups - https://github.com/kiranjpjk/Penetration-Testing-VMs-and-Web - https://github.com/liorsivan/hackthebox-machines - https://github.com/lnick2023/nicenice - https://github.com/lyshark/Windows-exploits - https://github.com/mchklt/PFE - https://github.com/merlinepedra/SCAN4LL - https://github.com/merlinepedra25/SCAN4ALL-1 - https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense - https://github.com/morpheuslord/GPT_Vuln-analyzer - https://github.com/mynameisv/MMSBGA - https://github.com/n0-traces/cve_monitor - https://github.com/n3rdh4x0r/MS17-010 - https://github.com/n3rdh4x0r/MS17-010_CVE-2017-0143 - https://github.com/nadeemali79/AD-Attack-Defense - https://github.com/naotty/tryhackme - https://github.com/nirsarkar/scan4all - https://github.com/nonameyo/ThreatIntel-Barque - https://github.com/notsag-dev/htb-legacy - https://github.com/nzelyn/GPT_Vuln-analyzer - https://github.com/omkalyankar/Network-Scanning-and-Vulnerability-Assessment - https://github.com/p0pp3t0n/MS17-010-Dockerfile - https://github.com/paramint/AD-Attack-Defense - https://github.com/pedro-canafistula/Auditoria-de-Seguranca-com-OpenVas - https://github.com/program-smith/THM-Blue - https://github.com/puckiestyle/A-Red-Teamer-diaries - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ramyardaneshgar/OpenVas - https://github.com/ramyardaneshgar/THM-Writeup-OpenVas - https://github.com/retr0-13/AD-Attack-Defense - https://github.com/roomkangali/DursVulnNSE - https://github.com/rosonsec/Exploits - https://github.com/santhosheyzz/Basic-Vulnerability-Scan-Pc - https://github.com/seedon198/Shodan-AIO - https://github.com/seeu-inspace/easyg - https://github.com/sponkmonk/Ladon_english_update - https://github.com/stormblack/smbvuln - https://github.com/substing/blue_ctf - https://github.com/sunylife24/TryHackMe2 - https://github.com/sunzu94/AD-Attack-Defense - https://github.com/superhero1/OSCP-Prep - https://github.com/sv3nbeast/Attack-Notes - https://github.com/syedfaizan9920/nmap-vulnerability-scan-windows7 - https://github.com/tamilselvan-cs/Task3-Vulnerability-scan - https://github.com/tataev/Security - https://github.com/tempiltin/active-directory_pentest - https://github.com/trhacknon/scan4all - https://github.com/tufanturhan/Red-Teamer-Diaries - https://github.com/uroboros-security/SMB-CVE - https://github.com/valarauco/wannafind - https://github.com/vkhalaim/Relevant---Penetration-Testing-Challenge-Solution- - https://github.com/w3security/goscan - https://github.com/wateroot/poc-exp - https://github.com/willamygarcia/Vuln_Windows_7_11 - https://github.com/wrlu/Vulnerabilities - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xiaoy-sec/Pentest_Note - https://github.com/xthemystik/xframe - https://github.com/ycdxsb/Exploits - https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/yeriej77/Identifying-and-Exploiting-Vulnerabilities - https://github.com/yeshwanthp999/Windows7-ms17-010- - https://github.com/zhang040723/web - https://github.com/zhanpengliu-tencent/medium-cve - https://github.com/zimmel15/HTBBlueWriteup - https://github.com/zulloper/cve-poc