Can you exploit the EternalBlue vulnerability (CVE-2017-0144) on a Windows 7 system and retrieve the hidden flag? Your goal is to gain administrative privileges and locate the flag.txt file stored in the `C:\Windows\System32` directory.# BlueDoor
Can you exploit the EternalBlue vulnerability (CVE-2017-0144) on a Windows 7 system and retrieve the hidden flag? Your goal is to gain administrative privileges and locate the flag.txt file stored in the `C:\Windows\System32` directory.
[4.0K] /data/pocs/214d6b88937d6813080539e016859701415ea49b
├── [4.0K] exploit-modules
│ ├── [ 27K] BUG.txt
│ ├── [2.4K] checker.py
│ ├── [ 25K] eternalblue_exploit7.py
│ ├── [ 24K] eternalblue_exploit8.py
│ ├── [3.7K] eternalblue_poc.py
│ ├── [1.5K] eternalchampion_leak.py
│ ├── [5.8K] eternalchampion_poc2.py
│ ├── [2.5K] eternalchampion_poc.py
│ ├── [1.6K] eternalromance_leak.py
│ ├── [5.0K] eternalromance_poc2.py
│ ├── [ 948] eternalromance_poc.py
│ ├── [1.8K] eternalsynergy_leak.py
│ ├── [3.0K] eternalsynergy_poc.py
│ ├── [1.1K] infoleak_uninit.py
│ ├── [ 16K] mysmb.py
│ ├── [1.8K] npp_control.py
│ ├── [3.3K] README.md
│ ├── [4.0K] shellcode
│ │ ├── [ 20K] eternalblue_kshellcode_x64.asm
│ │ ├── [ 19K] eternalblue_kshellcode_x86.asm
│ │ └── [1.6K] eternalblue_sc_merge.py
│ └── [ 42K] zzz_exploit.py
├── [4.0K] Instructions
│ ├── [1.3K] deployment.md
│ └── [ 33K] image-2.png
└── [ 248] README.md
3 directories, 24 files