### [CVE-2017-0144](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0144) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20SMB&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=The%20SMBv1%20server%20in%20Microsoft%20Windows%20Vista%20SP2%3B%20Windows%20Server%202008%20SP2%20and%20R2%20SP1%3B%20Windows%207%20SP1%3B%20Windows%208.1%3B%20Windows%20Server%202012%20Gold%20and%20R2%3B%20Windows%20RT%208.1%3B%20and%20Windows%2010%20Gold%2C%201511%2C%20and%201607%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen) ### Description The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. ### POC #### Reference - http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - https://www.exploit-db.com/exploits/41891/ - https://www.exploit-db.com/exploits/41987/ - https://www.exploit-db.com/exploits/42030/ - https://www.exploit-db.com/exploits/42031/ #### Github - https://github.com/0xAbbarhSF/Termux-Nation-2022-Alpha - https://github.com/0xBV/Vulnerability-Management - https://github.com/0xabdoulaye/CTFs-Journey - https://github.com/0xsyr0/OSCP - https://github.com/1999matrix/vulnerability-scanner - https://github.com/61106960/adPEAS - https://github.com/90l3m0np13/Eternal - https://github.com/A1irzayevv/akm-python_final_project - https://github.com/AMatheusFeitosaM/OSCP-Cheat - https://github.com/ARPSyndicate/cvemon - https://github.com/Abhishek9911-bit/Internship-Task-3-Elevate-Labs - https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint - https://github.com/Ahmadam37/Vulnerability-Analysis - https://github.com/Alan-coder-eng/vulnerability-pocs-collection - https://github.com/AlexielArdilla/El-libro-completo-del-Hacker - https://github.com/Ali-Imangholi/EternalBlueTrojan - https://github.com/Ansuman2004/Basic_Vulnerability_Scan - https://github.com/AntiDajjal/S012 - https://github.com/AnugiArrawwala/CVE-Research - https://github.com/Astrogeorgeonethree/Starred - https://github.com/Astrogeorgeonethree/Starred2 - https://github.com/Atem1988/Starred - https://github.com/AtithKhawas/autoblue - https://github.com/BHAVYA-dendi/cybersecurityintern - https://github.com/BILLYZAS/Portfolio - https://github.com/BengaminButton/XILLEN-Vulnerability-Scanner - https://github.com/BerkutSolutions/berkut-cyber-base - https://github.com/Bharathkasyap/programmatic-vulnerability-remediations-Bharath - https://github.com/Bhavya-2508/cybersec-task-03-vuln-scan - https://github.com/BusyDetective/ElevateLabs_3 - https://github.com/ByteX7/RansomGuard - https://github.com/CPester05/Exploits - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CharanKairoju/Cybersecurity_Intership - https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections - https://github.com/CodeWithSurya/-awesome-termux-hacking - https://github.com/CodingChatRoom/Advance-Reconnaissance- - https://github.com/CodingChatRoom/metasploit-cheatsheet-saqlain - https://github.com/CrossCodeXm/El-libro-completo-del-Hacker - https://github.com/Cruxer8Mech/Idk - https://github.com/CyberClarity/Vulnerability-scan-task - https://github.com/Cyberwatch/cyberwatch_api_powershell - https://github.com/Cybug-404/Task_3 - https://github.com/DParijat07/Vulnerability-Assessment-Simulation - https://github.com/DamnYatin/All-in-one-termux-tools - https://github.com/Dareh123/Jubilant - https://github.com/David-Ogrande/CVEs-NVD - https://github.com/Dendipriyankareddy/cybersecurityinternship - https://github.com/DenuwanJayasekara/CVE-Exploitation-Reports - https://github.com/Devil-Gulshan/cybersecurity-intern-tasks- - https://github.com/Divi-R0706/basic_vulnerable_scan - https://github.com/Drevon-Shaw/Basic-Pentesting-Lab - https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution - https://github.com/EagleCyber-74/500-tools - https://github.com/EmanuelEdi/ETERNAL-BLUE - https://github.com/EnriqueSanchezdelVillar/NotesHck - https://github.com/ErdemOzgen/ActiveDirectoryAttacks - https://github.com/FATEHALI-ABBASALI/Cybersecurity-Task3-OpenVas-Scan - https://github.com/FaithOnosoneTech/Penetration-Testing-Project - https://github.com/Faizan-Khanx/CEH-Preparation - https://github.com/Faizan-Khanx/OSCP - https://github.com/Frat1n/Escalibur_Framework - https://github.com/FutureComputing4AI/ClarAVy - https://github.com/GSayali-D/Internship-task-report - https://github.com/GenisMil/MetasploitAvanzado1--meterpreter - https://github.com/Ghebriou/platform_pfe - https://github.com/GhostTroops/TOP - https://github.com/GhostTroops/scan4all - https://github.com/GoDsUnReAL/fun - https://github.com/Guccifer808/doublepulsar-scanner-golang - https://github.com/HarshRajSinghania/smbvulnrecon - https://github.com/IagoRamosH/Security-EternalBlue-Bluekeep - https://github.com/IndulgeinDotNet/UtilityMaestro - https://github.com/Itz-Ayanokoji/All-in-one-termux-tools - https://github.com/JERRY123S/all-poc - https://github.com/JMG15111998/Common-Vulnerabilities-and-Exposures-CVEs- - https://github.com/JeffEmrys/termux- - https://github.com/Jeremias215/VulnerabilityManagement - https://github.com/Jimi421/NakulaScan-2.0 - https://github.com/Jordann04/TwinJordan - https://github.com/K1ngDamien/epss-super-sorter - https://github.com/Kiz619ao630/StepwisePolicy3 - https://github.com/Kuromesi/Py4CSKG - https://github.com/LT7T/SecMCP - https://github.com/LinuxUser255/Python_Penetration_Testing - https://github.com/Lynk4/Windows-Server-2008-VAPT - https://github.com/ManojPatil99/WannaCry-Ransomware-Malware-Analysis - https://github.com/Manrajprojects/Comptia-security-cheetsheet - https://github.com/MarikalAbhijeet/PentestReport - https://github.com/MedX267/EternalBlue-Vulnerability-Scanner - https://github.com/MedzfarGapur/Medzfar-Gapur - https://github.com/MenatiVyshnavi/internship-task-3-elevate-labs- - https://github.com/MichaelColburn/externalblue_exploit_exploratory_sim - https://github.com/Mickael5466/GG - https://github.com/Mo-jaw0311/Reverse-TCP-Payload-Penetration-Test- - https://github.com/MohammaD2020193/CyberThreat-Landscape-Report - https://github.com/Mohammad-mo-02/Cyber-Physical-Security-Labs - https://github.com/Monsterlallu/Agori-Baba - https://github.com/Monsterlallu/Cyber-Kunjaali - https://github.com/Monsterlallu/Top-500-hacking-tools - https://github.com/NetworkingPassionate/Nessus-Essentials - https://github.com/NeuromorphicComputationResearchProgram/ClarAVy - https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense - https://github.com/NoelBradford/Windows11-Hardening-Powershell-Scripts - https://github.com/OmmAshutosh/EL_Internship_Task-3 - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/PWN-Kingdom/Test_Tasks - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups - https://github.com/Phranavh28/vulnerability-management-azure-vm - https://github.com/PotiteBulle/CVE20170144_EternalCustom - https://github.com/Pranav-V-20/Windows-7-Exploitation-Using-Metasploit - https://github.com/Project-WARMIND/Exploit-Modules - https://github.com/PuddinCat/GithubRepoSpider - https://github.com/QWERTSKIHACK/awesome-termux-hacking - https://github.com/R-Vision/ms17-010 - https://github.com/R0B1NL1N/AD-Attack-Defense - https://github.com/RTKartograph/MS17-010-DetectorTool - https://github.com/Ratlesv/Scan4all - https://github.com/RedYetiDev/RedYetiDev - https://github.com/ReflectedThanatos/OSCP-cheatsheet - https://github.com/Rockydirector/CS_Intern_task3 - https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API - https://github.com/SNGWN/CEH-Notes - https://github.com/SaintsConnor/Exploits - https://github.com/Sampeerez/eJPT-notes - https://github.com/SantoriuHen/NotesHck - https://github.com/SatenderKumar3024/CompTIA-Cloud-Certification-Exam---EXAM-NUMBER-CV0-004---Satender-Kumar - https://github.com/SenukDias/OSCP_cheat - https://github.com/ShubhamGuptaIN/WannaCry-ransomware-attack-Virus - https://github.com/SirElmard/ethical_hacking - https://github.com/SoLuckyMan/MaxPatrolSIEM - https://github.com/Sriram080604/Openvas-scan-report - https://github.com/Theophile-Wemaere/poc-on-github-downloader - https://github.com/Totes5706/TotesHTB - https://github.com/UNO-Babb/CYBR1100 - https://github.com/VOIDSEQ/RansomGuard - https://github.com/Vaneeza-7/Eternal-Blue-Exploit - https://github.com/ViktorParkhomenko/Malware-analysis-lab-with-FLARE-VM - https://github.com/VishuGahlyan/OSCP - https://github.com/VpSanta3/Rscan - https://github.com/Whiteh4tWolf/Attack-Defense - https://github.com/Yehender/tkpentest - https://github.com/ZTK-009/Aggressor - https://github.com/ZTK-009/Ladon - https://github.com/ZTK-009/PowerLadon - https://github.com/ZTheH/netmap - https://github.com/ZeeRahul/Eternal-Blue-Vulnerability-Exploitation - https://github.com/Zeyad-Azima/Remedy4me - https://github.com/ZyberPatrol/Active-Directory - https://github.com/abbasahsan1/abbasahsan1 - https://github.com/adevsec/EternalBLue-MS17-010- - https://github.com/adeyholar/Foundation-Sec-8B-4b-quant - https://github.com/ainfosec/tnok - https://github.com/ajansha/EternalBlue - https://github.com/ajb3932/AD_Pentesting - https://github.com/alby0304/WannaCry_Analysis - https://github.com/alex-chh/trae-ai-metasploit-mcp-integration - https://github.com/almalikzakwan/Lemon-DuckAnalysis - https://github.com/androidkey/MS17-011 - https://github.com/annusaiprasad/petya_malware_analysis - https://github.com/ar2o3/Termux-Nation-2022-Alpha - https://github.com/arnausubiros/metasploit-ms17-010_tryhackme - https://github.com/aseams/Pentest-Toolkit - https://github.com/ashishchandel06/WannaCry_Ransomware_Report. - https://github.com/ashoka11/SimSpace_Cyber_Range_School_Project - https://github.com/aymankhder/AD-attack-defense - https://github.com/ayushkumar123a/cybersecurity-task1-portscan - https://github.com/bachkhoasoft/ct-hacking-master - https://github.com/badigervijay/AI-Based-Threat-Intelligence-Platform - https://github.com/bhataasim1/AD-Attack-Defence - https://github.com/boss-net/goscan - https://github.com/bsbsmaster/OSCP-Cheat-Sheet - https://github.com/bzuracyber/Automated-Vulnerability-Remediation - https://github.com/c0mrade12211/Pentests - https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode - https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode - https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag- - https://github.com/chaao195/EBEKv2.0 - https://github.com/ckotugeh/smb-toolkit - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/cyberleelawat/LeelawatX-CVE-Hunter - https://github.com/d01ki/BreachPilot - https://github.com/d0n601/Pentest-Cheat-Sheet - https://github.com/d4redevilx/eJPT-notes - https://github.com/d4redevilx/eJPTv2-notes - https://github.com/dita-cyber/SOC-L2-Interview-Prep - https://github.com/diyarit/Ad-Peas - https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144 - https://github.com/elsevar11/CVE_SCRAPER - https://github.com/ericjiang97/SecScripts - https://github.com/exfilt/CheatSheet - https://github.com/fartaviao/tryhackme-blue - https://github.com/fazilbaig1/oscp - https://github.com/fernandopaezmartin/SAD_2021--Metasploit - https://github.com/geeksniper/active-directory-pentest - https://github.com/ginapalomo/ScanAll - https://github.com/giriaryan694-a11y/exposed-win-zero-days - https://github.com/giterlizzi/secdb-feeds - https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense- - https://github.com/haginara/msrc-python - https://github.com/heruidong/scan4all - https://github.com/himera25/hacking-tools-2023 - https://github.com/himera25/termux-hacking - https://github.com/hktalent/TOP - https://github.com/hktalent/bug-bounty - https://github.com/hktalent/scan4all - https://github.com/hub-spot/Network-Security-Training - https://github.com/ibrahimsaleem/PentestThinkingMCP - https://github.com/ilona-baude/wireshark - https://github.com/im4vk/IternalVlue - https://github.com/infosecn1nja/AD-Attack-Defense - https://github.com/itscio/Aggressor - https://github.com/jbmihoub/all-poc - https://github.com/jeffc04/vulnerability-management-program - https://github.com/jithub07/vulnerability-scan-task - https://github.com/jitmondal1/OSCP - https://github.com/joyce8/MalDICT - https://github.com/just0rg/Security-Interview - https://github.com/k8gege/Aggressor - https://github.com/k8gege/Ladon - https://github.com/k8gege/PowerLadon - https://github.com/kdcloverkid/https-github.com-kdcloverkid-awesome-termux-hacking - https://github.com/kgwanjala/oscp-cheatsheet - https://github.com/kimocoder/eternalblue - https://github.com/koorchik/dissert - https://github.com/koorchik/llm-analysis-of-text-data - https://github.com/linghaomeng/YBYB-590-capstone - https://github.com/lnick2023/nicenice - https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144 - https://github.com/lxmrtnz/project-andromeda - https://github.com/lycaleynes/NMAP-and-Wireshark - https://github.com/lycaleynes/Nmap - https://github.com/may215/awesome-termux-hacking - https://github.com/mazharkhanpathan61354/cyber-security-internship-task-3 - https://github.com/merlinepedra/SCAN4LL - https://github.com/merlinepedra25/SCAN4ALL-1 - https://github.com/micaelarg/vulnerability_scanner_public - https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense - https://github.com/monjheta/windowserverr2 - https://github.com/monsifhmouri/BlackSun - https://github.com/moromerx/vuln-crud-api - https://github.com/moromerx/vuln-tracker-api - https://github.com/mrk336/CVE-2025-55234 - https://github.com/mssky9527/Rscan - https://github.com/n0-traces/cve_monitor - https://github.com/nadeemali79/AD-Attack-Defense - https://github.com/naufalazhar65/ETHICAL-HACKING-DOCS - https://github.com/ndouglas-cloudsmith/exploit-check - https://github.com/nenandjabhata/CTFs-Journey - https://github.com/nirsarkar/scan4all - https://github.com/nitinsanap95-hash/Elevate-Lab-Project----50-Question-Ansers - https://github.com/nullaresponsio/Eternal-Pulse-5.2 - https://github.com/onebyte0x00/Cyber_svchost.exe - https://github.com/oscpname/OSCP_cheat - https://github.com/osogi/NTO_2022 - https://github.com/paramint/AD-Attack-Defense - https://github.com/parth45/cheatsheet - https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework- - https://github.com/peterpt/eternal_scanner - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/quynhold/Detect-CVE-2017-0144-attack - https://github.com/r-a-h-u-l2325/patch_management_report.md-Detailed-report- - https://github.com/ramyardaneshgar/NetworkServices - https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs - https://github.com/redteammember/Malware-Analysis - https://github.com/retr0-13/AD-Attack-Defense - https://github.com/revanmalang/OSCP - https://github.com/rgzi/eJPTv2-Notes - https://github.com/ritheesh0/SOC-Incident-Response-Lab - https://github.com/rjjoyce/MalDICT - https://github.com/ronak4044/Cybersecurity-Task3 - https://github.com/roomkangali/DursVuln-Database - https://github.com/roomkangali/DursVulnNSE - https://github.com/rvsvishnuv/rvsvishnuv.github.io - https://github.com/sethwhy/BlueDoor - https://github.com/shaoo0l/elevate-labs-task-3 - https://github.com/shaxana/cve_project_akm - https://github.com/shubhamg0sai/All_top_500_hacking_tool - https://github.com/shubhamg0sai/top_500_tool - https://github.com/skeeperloyaltie/network - https://github.com/skhjacksonheights/bestTermuxTools_skh - https://github.com/skjortan23/read-team-mcp-server - https://github.com/speinador/ADVulnScan - https://github.com/sponkmonk/Ladon_english_update - https://github.com/starlingvibes/TryHackMe - https://github.com/subha-86/nessus_vulnerability-scanning - https://github.com/sudotsu/termuxhacking - https://github.com/suman-git74/Vulnerability-Scanner - https://github.com/sunzu94/AD-Attack-Defense - https://github.com/sweetpotatohack/akuma-advanced-scanner - https://github.com/sworatz/toolx500 - https://github.com/syedayman/Network-PenTest-Project - https://github.com/syedayman/Penetration-Test - https://github.com/tanjiti/sec_profile - https://github.com/tataev/Security - https://github.com/tempiltin/active-directory_pentest - https://github.com/theh1t3sh/CTF - https://github.com/thekarunakarreddy/Enterprise-Security-Assessment - https://github.com/threatsurfer/cve-attack-mapper - https://github.com/tmwf1475/AegisGuard - https://github.com/trhacknon/scan4all - https://github.com/txuswashere/OSCP - https://github.com/uroboros-security/SMB-CVE - https://github.com/vjp-albertoVG/PPS-Unidad3Actividad2-AlbertoVG - https://github.com/vjp-pabloGG/PPS-Unidad3Actividad2-PabloGil - https://github.com/w3security/goscan - https://github.com/waleedelsmedesy22/EternalBlue-DoublePulsar-Exploit-Windows-7- - https://github.com/weeka10/-hktalent-TOP - https://github.com/willamygarcia/Vuln_Windows_7_11 - https://github.com/witblack/G3nius-Tools-Sploit - https://github.com/wuvel/TryHackMe - https://github.com/xasyhack/oscp2025 - https://github.com/xasyhack/oscp_cheat_sheet_2025 - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xhref/OSCP - https://github.com/y102Abinash/Vulnerable-_-nessus-scan-report - https://github.com/yaakulya123/casestudies - https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/yp-ww/HTB-CheatSheet - https://github.com/yzk0b/TERMUX-RD - https://github.com/zorikcherfas/eternalblue_linux_cpp