mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-15 07:40:25 +02:00
346 lines
18 KiB
Markdown
346 lines
18 KiB
Markdown
### [CVE-2017-0144](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0144)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html
|
|
- http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html
|
|
- https://www.exploit-db.com/exploits/41891/
|
|
- https://www.exploit-db.com/exploits/41987/
|
|
- https://www.exploit-db.com/exploits/42030/
|
|
- https://www.exploit-db.com/exploits/42031/
|
|
|
|
#### Github
|
|
- https://github.com/0xAbbarhSF/Termux-Nation-2022-Alpha
|
|
- https://github.com/0xBV/Vulnerability-Management
|
|
- https://github.com/0xabdoulaye/CTFs-Journey
|
|
- https://github.com/0xsyr0/OSCP
|
|
- https://github.com/1999matrix/vulnerability-scanner
|
|
- https://github.com/61106960/adPEAS
|
|
- https://github.com/90l3m0np13/Eternal
|
|
- https://github.com/A1irzayevv/akm-python_final_project
|
|
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Abhishek9911-bit/Internship-Task-3-Elevate-Labs
|
|
- https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint
|
|
- https://github.com/Ahmadam37/Vulnerability-Analysis
|
|
- https://github.com/Alan-coder-eng/vulnerability-pocs-collection
|
|
- https://github.com/AlexielArdilla/El-libro-completo-del-Hacker
|
|
- https://github.com/Ali-Imangholi/EternalBlueTrojan
|
|
- https://github.com/Ansuman2004/Basic_Vulnerability_Scan
|
|
- https://github.com/AntiDajjal/S012
|
|
- https://github.com/AnugiArrawwala/CVE-Research
|
|
- https://github.com/Astrogeorgeonethree/Starred
|
|
- https://github.com/Astrogeorgeonethree/Starred2
|
|
- https://github.com/Atem1988/Starred
|
|
- https://github.com/AtithKhawas/autoblue
|
|
- https://github.com/BHAVYA-dendi/cybersecurityintern
|
|
- https://github.com/BILLYZAS/Portfolio
|
|
- https://github.com/BengaminButton/XILLEN-Vulnerability-Scanner
|
|
- https://github.com/BerkutSolutions/berkut-cyber-base
|
|
- https://github.com/Bharathkasyap/programmatic-vulnerability-remediations-Bharath
|
|
- https://github.com/Bhavya-2508/cybersec-task-03-vuln-scan
|
|
- https://github.com/BusyDetective/ElevateLabs_3
|
|
- https://github.com/ByteX7/RansomGuard
|
|
- https://github.com/CPester05/Exploits
|
|
- https://github.com/CVEDB/PoC-List
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CVEDB/top
|
|
- https://github.com/CharanKairoju/Cybersecurity_Intership
|
|
- https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections
|
|
- https://github.com/CodeWithSurya/-awesome-termux-hacking
|
|
- https://github.com/CodingChatRoom/Advance-Reconnaissance-
|
|
- https://github.com/CodingChatRoom/metasploit-cheatsheet-saqlain
|
|
- https://github.com/CrossCodeXm/El-libro-completo-del-Hacker
|
|
- https://github.com/Cruxer8Mech/Idk
|
|
- https://github.com/CyberClarity/Vulnerability-scan-task
|
|
- https://github.com/Cyberwatch/cyberwatch_api_powershell
|
|
- https://github.com/Cybug-404/Task_3
|
|
- https://github.com/DParijat07/Vulnerability-Assessment-Simulation
|
|
- https://github.com/DamnYatin/All-in-one-termux-tools
|
|
- https://github.com/Dareh123/Jubilant
|
|
- https://github.com/David-Ogrande/CVEs-NVD
|
|
- https://github.com/Dendipriyankareddy/cybersecurityinternship
|
|
- https://github.com/DenuwanJayasekara/CVE-Exploitation-Reports
|
|
- https://github.com/Devil-Gulshan/cybersecurity-intern-tasks-
|
|
- https://github.com/Divi-R0706/basic_vulnerable_scan
|
|
- https://github.com/Drevon-Shaw/Basic-Pentesting-Lab
|
|
- https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution
|
|
- https://github.com/EagleCyber-74/500-tools
|
|
- https://github.com/EmanuelEdi/ETERNAL-BLUE
|
|
- https://github.com/EnriqueSanchezdelVillar/NotesHck
|
|
- https://github.com/ErdemOzgen/ActiveDirectoryAttacks
|
|
- https://github.com/FATEHALI-ABBASALI/Cybersecurity-Task3-OpenVas-Scan
|
|
- https://github.com/FaithOnosoneTech/Penetration-Testing-Project
|
|
- https://github.com/Faizan-Khanx/CEH-Preparation
|
|
- https://github.com/Faizan-Khanx/OSCP
|
|
- https://github.com/Frat1n/Escalibur_Framework
|
|
- https://github.com/FutureComputing4AI/ClarAVy
|
|
- https://github.com/GSayali-D/Internship-task-report
|
|
- https://github.com/GenisMil/MetasploitAvanzado1--meterpreter
|
|
- https://github.com/Ghebriou/platform_pfe
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/GhostTroops/scan4all
|
|
- https://github.com/GoDsUnReAL/fun
|
|
- https://github.com/Guccifer808/doublepulsar-scanner-golang
|
|
- https://github.com/HarshRajSinghania/smbvulnrecon
|
|
- https://github.com/IagoRamosH/Security-EternalBlue-Bluekeep
|
|
- https://github.com/IndulgeinDotNet/UtilityMaestro
|
|
- https://github.com/Itz-Ayanokoji/All-in-one-termux-tools
|
|
- https://github.com/JERRY123S/all-poc
|
|
- https://github.com/JMG15111998/Common-Vulnerabilities-and-Exposures-CVEs-
|
|
- https://github.com/JeffEmrys/termux-
|
|
- https://github.com/Jeremias215/VulnerabilityManagement
|
|
- https://github.com/Jimi421/NakulaScan-2.0
|
|
- https://github.com/Jordann04/TwinJordan
|
|
- https://github.com/K1ngDamien/epss-super-sorter
|
|
- https://github.com/Kiz619ao630/StepwisePolicy3
|
|
- https://github.com/Kuromesi/Py4CSKG
|
|
- https://github.com/LT7T/SecMCP
|
|
- https://github.com/LinuxUser255/Python_Penetration_Testing
|
|
- https://github.com/Lynk4/Windows-Server-2008-VAPT
|
|
- https://github.com/ManojPatil99/WannaCry-Ransomware-Malware-Analysis
|
|
- https://github.com/Manrajprojects/Comptia-security-cheetsheet
|
|
- https://github.com/MarikalAbhijeet/PentestReport
|
|
- https://github.com/MedX267/EternalBlue-Vulnerability-Scanner
|
|
- https://github.com/MedzfarGapur/Medzfar-Gapur
|
|
- https://github.com/MenatiVyshnavi/internship-task-3-elevate-labs-
|
|
- https://github.com/MichaelColburn/externalblue_exploit_exploratory_sim
|
|
- https://github.com/Mickael5466/GG
|
|
- https://github.com/Mo-jaw0311/Reverse-TCP-Payload-Penetration-Test-
|
|
- https://github.com/MohammaD2020193/CyberThreat-Landscape-Report
|
|
- https://github.com/Mohammad-mo-02/Cyber-Physical-Security-Labs
|
|
- https://github.com/Monsterlallu/Agori-Baba
|
|
- https://github.com/Monsterlallu/Cyber-Kunjaali
|
|
- https://github.com/Monsterlallu/Top-500-hacking-tools
|
|
- https://github.com/NetworkingPassionate/Nessus-Essentials
|
|
- https://github.com/NeuromorphicComputationResearchProgram/ClarAVy
|
|
- https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense
|
|
- https://github.com/NoelBradford/Windows11-Hardening-Powershell-Scripts
|
|
- https://github.com/OmmAshutosh/EL_Internship_Task-3
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/PWN-Kingdom/Test_Tasks
|
|
- https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups
|
|
- https://github.com/Phranavh28/vulnerability-management-azure-vm
|
|
- https://github.com/PotiteBulle/CVE20170144_EternalCustom
|
|
- https://github.com/Pranav-V-20/Windows-7-Exploitation-Using-Metasploit
|
|
- https://github.com/Project-WARMIND/Exploit-Modules
|
|
- https://github.com/PuddinCat/GithubRepoSpider
|
|
- https://github.com/QWERTSKIHACK/awesome-termux-hacking
|
|
- https://github.com/R-Vision/ms17-010
|
|
- https://github.com/R0B1NL1N/AD-Attack-Defense
|
|
- https://github.com/RTKartograph/MS17-010-DetectorTool
|
|
- https://github.com/Ratlesv/Scan4all
|
|
- https://github.com/RedYetiDev/RedYetiDev
|
|
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
|
|
- https://github.com/Rockydirector/CS_Intern_task3
|
|
- https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API
|
|
- https://github.com/SNGWN/CEH-Notes
|
|
- https://github.com/SaintsConnor/Exploits
|
|
- https://github.com/Sampeerez/eJPT-notes
|
|
- https://github.com/SantoriuHen/NotesHck
|
|
- https://github.com/SatenderKumar3024/CompTIA-Cloud-Certification-Exam---EXAM-NUMBER-CV0-004---Satender-Kumar
|
|
- https://github.com/SenukDias/OSCP_cheat
|
|
- https://github.com/ShubhamGuptaIN/WannaCry-ransomware-attack-Virus
|
|
- https://github.com/SirElmard/ethical_hacking
|
|
- https://github.com/SoLuckyMan/MaxPatrolSIEM
|
|
- https://github.com/Sriram080604/Openvas-scan-report
|
|
- https://github.com/Theophile-Wemaere/poc-on-github-downloader
|
|
- https://github.com/Totes5706/TotesHTB
|
|
- https://github.com/UNO-Babb/CYBR1100
|
|
- https://github.com/VOIDSEQ/RansomGuard
|
|
- https://github.com/Vaneeza-7/Eternal-Blue-Exploit
|
|
- https://github.com/ViktorParkhomenko/Malware-analysis-lab-with-FLARE-VM
|
|
- https://github.com/VishuGahlyan/OSCP
|
|
- https://github.com/VpSanta3/Rscan
|
|
- https://github.com/Whiteh4tWolf/Attack-Defense
|
|
- https://github.com/Yehender/tkpentest
|
|
- https://github.com/ZTK-009/Aggressor
|
|
- https://github.com/ZTK-009/Ladon
|
|
- https://github.com/ZTK-009/PowerLadon
|
|
- https://github.com/ZTheH/netmap
|
|
- https://github.com/ZeeRahul/Eternal-Blue-Vulnerability-Exploitation
|
|
- https://github.com/Zeyad-Azima/Remedy4me
|
|
- https://github.com/ZyberPatrol/Active-Directory
|
|
- https://github.com/abbasahsan1/abbasahsan1
|
|
- https://github.com/adevsec/EternalBLue-MS17-010-
|
|
- https://github.com/adeyholar/Foundation-Sec-8B-4b-quant
|
|
- https://github.com/ainfosec/tnok
|
|
- https://github.com/ajansha/EternalBlue
|
|
- https://github.com/ajb3932/AD_Pentesting
|
|
- https://github.com/alby0304/WannaCry_Analysis
|
|
- https://github.com/alex-chh/trae-ai-metasploit-mcp-integration
|
|
- https://github.com/almalikzakwan/Lemon-DuckAnalysis
|
|
- https://github.com/androidkey/MS17-011
|
|
- https://github.com/annusaiprasad/petya_malware_analysis
|
|
- https://github.com/ar2o3/Termux-Nation-2022-Alpha
|
|
- https://github.com/arnausubiros/metasploit-ms17-010_tryhackme
|
|
- https://github.com/aseams/Pentest-Toolkit
|
|
- https://github.com/ashishchandel06/WannaCry_Ransomware_Report.
|
|
- https://github.com/ashoka11/SimSpace_Cyber_Range_School_Project
|
|
- https://github.com/aymankhder/AD-attack-defense
|
|
- https://github.com/ayushkumar123a/cybersecurity-task1-portscan
|
|
- https://github.com/bachkhoasoft/ct-hacking-master
|
|
- https://github.com/badigervijay/AI-Based-Threat-Intelligence-Platform
|
|
- https://github.com/bhataasim1/AD-Attack-Defence
|
|
- https://github.com/boss-net/goscan
|
|
- https://github.com/bsbsmaster/OSCP-Cheat-Sheet
|
|
- https://github.com/bzuracyber/Automated-Vulnerability-Remediation
|
|
- https://github.com/c0mrade12211/Pentests
|
|
- https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode
|
|
- https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode
|
|
- https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag-
|
|
- https://github.com/chaao195/EBEKv2.0
|
|
- https://github.com/ckotugeh/smb-toolkit
|
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
|
- https://github.com/cyberleelawat/LeelawatX-CVE-Hunter
|
|
- https://github.com/d01ki/BreachPilot
|
|
- https://github.com/d0n601/Pentest-Cheat-Sheet
|
|
- https://github.com/d4redevilx/eJPT-notes
|
|
- https://github.com/d4redevilx/eJPTv2-notes
|
|
- https://github.com/dita-cyber/SOC-L2-Interview-Prep
|
|
- https://github.com/diyarit/Ad-Peas
|
|
- https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144
|
|
- https://github.com/elsevar11/CVE_SCRAPER
|
|
- https://github.com/ericjiang97/SecScripts
|
|
- https://github.com/exfilt/CheatSheet
|
|
- https://github.com/fartaviao/tryhackme-blue
|
|
- https://github.com/fazilbaig1/oscp
|
|
- https://github.com/fernandopaezmartin/SAD_2021--Metasploit
|
|
- https://github.com/geeksniper/active-directory-pentest
|
|
- https://github.com/ginapalomo/ScanAll
|
|
- https://github.com/giriaryan694-a11y/exposed-win-zero-days
|
|
- https://github.com/giterlizzi/secdb-feeds
|
|
- https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense-
|
|
- https://github.com/haginara/msrc-python
|
|
- https://github.com/heruidong/scan4all
|
|
- https://github.com/himera25/hacking-tools-2023
|
|
- https://github.com/himera25/termux-hacking
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/hktalent/bug-bounty
|
|
- https://github.com/hktalent/scan4all
|
|
- https://github.com/hub-spot/Network-Security-Training
|
|
- https://github.com/ibrahimsaleem/PentestThinkingMCP
|
|
- https://github.com/ilona-baude/wireshark
|
|
- https://github.com/im4vk/IternalVlue
|
|
- https://github.com/infosecn1nja/AD-Attack-Defense
|
|
- https://github.com/itscio/Aggressor
|
|
- https://github.com/jbmihoub/all-poc
|
|
- https://github.com/jeffc04/vulnerability-management-program
|
|
- https://github.com/jithub07/vulnerability-scan-task
|
|
- https://github.com/jitmondal1/OSCP
|
|
- https://github.com/joyce8/MalDICT
|
|
- https://github.com/just0rg/Security-Interview
|
|
- https://github.com/k8gege/Aggressor
|
|
- https://github.com/k8gege/Ladon
|
|
- https://github.com/k8gege/PowerLadon
|
|
- https://github.com/kdcloverkid/https-github.com-kdcloverkid-awesome-termux-hacking
|
|
- https://github.com/kgwanjala/oscp-cheatsheet
|
|
- https://github.com/kimocoder/eternalblue
|
|
- https://github.com/koorchik/dissert
|
|
- https://github.com/koorchik/llm-analysis-of-text-data
|
|
- https://github.com/linghaomeng/YBYB-590-capstone
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144
|
|
- https://github.com/lxmrtnz/project-andromeda
|
|
- https://github.com/lycaleynes/NMAP-and-Wireshark
|
|
- https://github.com/lycaleynes/Nmap
|
|
- https://github.com/may215/awesome-termux-hacking
|
|
- https://github.com/mazharkhanpathan61354/cyber-security-internship-task-3
|
|
- https://github.com/merlinepedra/SCAN4LL
|
|
- https://github.com/merlinepedra25/SCAN4ALL-1
|
|
- https://github.com/micaelarg/vulnerability_scanner_public
|
|
- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense
|
|
- https://github.com/monjheta/windowserverr2
|
|
- https://github.com/monsifhmouri/BlackSun
|
|
- https://github.com/moromerx/vuln-crud-api
|
|
- https://github.com/moromerx/vuln-tracker-api
|
|
- https://github.com/mrk336/CVE-2025-55234
|
|
- https://github.com/mssky9527/Rscan
|
|
- https://github.com/n0-traces/cve_monitor
|
|
- https://github.com/nadeemali79/AD-Attack-Defense
|
|
- https://github.com/naufalazhar65/ETHICAL-HACKING-DOCS
|
|
- https://github.com/ndouglas-cloudsmith/exploit-check
|
|
- https://github.com/nenandjabhata/CTFs-Journey
|
|
- https://github.com/nirsarkar/scan4all
|
|
- https://github.com/nitinsanap95-hash/Elevate-Lab-Project----50-Question-Ansers
|
|
- https://github.com/nullaresponsio/Eternal-Pulse-5.2
|
|
- https://github.com/onebyte0x00/Cyber_svchost.exe
|
|
- https://github.com/oscpname/OSCP_cheat
|
|
- https://github.com/osogi/NTO_2022
|
|
- https://github.com/paramint/AD-Attack-Defense
|
|
- https://github.com/parth45/cheatsheet
|
|
- https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework-
|
|
- https://github.com/peterpt/eternal_scanner
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/quynhold/Detect-CVE-2017-0144-attack
|
|
- https://github.com/r-a-h-u-l2325/patch_management_report.md-Detailed-report-
|
|
- https://github.com/ramyardaneshgar/NetworkServices
|
|
- https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs
|
|
- https://github.com/redteammember/Malware-Analysis
|
|
- https://github.com/retr0-13/AD-Attack-Defense
|
|
- https://github.com/revanmalang/OSCP
|
|
- https://github.com/rgzi/eJPTv2-Notes
|
|
- https://github.com/ritheesh0/SOC-Incident-Response-Lab
|
|
- https://github.com/rjjoyce/MalDICT
|
|
- https://github.com/ronak4044/Cybersecurity-Task3
|
|
- https://github.com/roomkangali/DursVuln-Database
|
|
- https://github.com/roomkangali/DursVulnNSE
|
|
- https://github.com/rvsvishnuv/rvsvishnuv.github.io
|
|
- https://github.com/sethwhy/BlueDoor
|
|
- https://github.com/shaoo0l/elevate-labs-task-3
|
|
- https://github.com/shaxana/cve_project_akm
|
|
- https://github.com/shubhamg0sai/All_top_500_hacking_tool
|
|
- https://github.com/shubhamg0sai/top_500_tool
|
|
- https://github.com/skeeperloyaltie/network
|
|
- https://github.com/skhjacksonheights/bestTermuxTools_skh
|
|
- https://github.com/skjortan23/read-team-mcp-server
|
|
- https://github.com/speinador/ADVulnScan
|
|
- https://github.com/sponkmonk/Ladon_english_update
|
|
- https://github.com/starlingvibes/TryHackMe
|
|
- https://github.com/subha-86/nessus_vulnerability-scanning
|
|
- https://github.com/sudotsu/termuxhacking
|
|
- https://github.com/suman-git74/Vulnerability-Scanner
|
|
- https://github.com/sunzu94/AD-Attack-Defense
|
|
- https://github.com/sweetpotatohack/akuma-advanced-scanner
|
|
- https://github.com/sworatz/toolx500
|
|
- https://github.com/syedayman/Network-PenTest-Project
|
|
- https://github.com/syedayman/Penetration-Test
|
|
- https://github.com/tanjiti/sec_profile
|
|
- https://github.com/tataev/Security
|
|
- https://github.com/tempiltin/active-directory_pentest
|
|
- https://github.com/theh1t3sh/CTF
|
|
- https://github.com/thekarunakarreddy/Enterprise-Security-Assessment
|
|
- https://github.com/threatsurfer/cve-attack-mapper
|
|
- https://github.com/tmwf1475/AegisGuard
|
|
- https://github.com/trhacknon/scan4all
|
|
- https://github.com/txuswashere/OSCP
|
|
- https://github.com/uroboros-security/SMB-CVE
|
|
- https://github.com/vjp-albertoVG/PPS-Unidad3Actividad2-AlbertoVG
|
|
- https://github.com/vjp-pabloGG/PPS-Unidad3Actividad2-PabloGil
|
|
- https://github.com/w3security/goscan
|
|
- https://github.com/waleedelsmedesy22/EternalBlue-DoublePulsar-Exploit-Windows-7-
|
|
- https://github.com/weeka10/-hktalent-TOP
|
|
- https://github.com/willamygarcia/Vuln_Windows_7_11
|
|
- https://github.com/witblack/G3nius-Tools-Sploit
|
|
- https://github.com/wuvel/TryHackMe
|
|
- https://github.com/xasyhack/oscp2025
|
|
- https://github.com/xasyhack/oscp_cheat_sheet_2025
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
- https://github.com/xhref/OSCP
|
|
- https://github.com/y102Abinash/Vulnerable-_-nessus-scan-report
|
|
- https://github.com/yaakulya123/casestudies
|
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
|
- https://github.com/yp-ww/HTB-CheatSheet
|
|
- https://github.com/yzk0b/TERMUX-RD
|
|
- https://github.com/zorikcherfas/eternalblue_linux_cpp
|
|
|