Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-0144 PoC — Microsoft Windows SMB 输入验证错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows SMB 输入验证错误漏洞 (CVE-2017-0144)
Description:The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Description
This script checks for devices vulnerable to the EternalBlue exploit (CVE-2017-0144) in a network using SMB.
Readme

EternalBlue Scanner
A Python tool for scanning SMB-enabled devices for the EternalBlue vulnerability (CVE-2017-0144). This script checks whether devices in a network are vulnerable to the EternalBlue exploit by testing SMB connections.

Features
Scans a list of IP addresses for SMB vulnerability.
Detects if the target machine is vulnerable to EternalBlue (CVE-2017-0144).
Parallel processing for scanning multiple devices quickly using ThreadPoolExecutor.
Simple and easy-to-use interface.
Requirements
Python 3.x
impacket library
Installation
Clone this repository:

git clone https://github.com/MedX267/EternalBlue-Vulnerability-Scanner.git

cd EternalBlue-Scanner

Install dependencies:

pip install -r requirements.txt
If you don't have a requirements.txt file, you can manually install Impacket with:

pip install impacket

Usage
Run the script by providing a list of target IP addresses:

python eternalblue_scanner.py <target_ip_1> <target_ip_2> ... <target_ip_n>
Example:

python eternalblue_scanner.py 192.168.1.1 192.168.1.2 192.168.1.3
The script will then check each IP for the EternalBlue vulnerability and display the results.

Output
The script will output whether each target IP is vulnerable or not vulnerable to EternalBlue, and show a summary of the results.


[+] 192.168.1.1 is VULNERABLE to EternalBlue!
[-] 192.168.1.2 is NOT VULNERABLE to EternalBlue.
[-] 192.168.1.3 is not reachable.

License
This tool is provided as-is for educational and testing purposes. Use responsibly and ensure you have proper authorization before scanning networks or devices.

File Snapshot

[4.0K] /data/pocs/b54d43d9735c651031b922edf18d4d2c3bd7933c ├── [2.4K] python eternalblue_scanner.py └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →