Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-0143 PoC — Microsoft Windows SMB 输入验证错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows SMB 输入验证错误漏洞 (CVE-2017-0143)
Description:The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Readme
##Exploiting CVE-2017-0143 - EternalBlue Vulnerability

📌 Description
This project demonstrates how to exploit the CVE-2017-0143 vulnerability (EternalBlue) in a controlled environment for educational and penetration testing purposes. The attack was performed on a Windows 7 system using Metasploit Framework.

🔍 About CVE-2017-0143
CVE-2017-0143 is a critical vulnerability in the SMBv1 protocol on Windows systems. It allows remote attackers to execute arbitrary code via specially crafted packets, leading to remote code execution (RCE). This vulnerability was part of the EternalBlue exploit leaked by Shadow Brokers in 2017.

Type: Remote Code Execution

Affected systems: Windows XP, Vista, 7, Server 2008, etc.

CVSS Score: 9.8 (Critical)

🛠 Tools Used
Kali Linux (as the attacker machine)

Metasploit Framework

Windows 7 (victim machine, vulnerable)

VirtualBox / VMware (for virtualization)
File Snapshot

[4.0K] /data/pocs/ab78a0cc9b8cd1a9e05b1b4274f61643e8c56a39 ├── [4.0K] images │   ├── [ 51K] Resim10.jpg │   ├── [ 19K] Resim11.jpg │   ├── [ 44K] Resim12.jpg │   ├── [ 30K] Resim1.jpg │   ├── [ 22K] Resim2.jpg │   ├── [ 27K] Resim3.jpg │   ├── [ 62K] Resim4.jpg │   ├── [ 21K] Resim5.jpg │   ├── [ 56K] Resim6.jpg │   ├── [ 64K] Resim7.jpg │   ├── [122K] Resim8.jpg │   └── [ 20K] Resim9.jpg ├── [ 932] README.md └── [2.2K] Steps.md 1 directory, 14 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →