This script checks for devices vulnerable to the EternalBlue exploit (CVE-2017-0144) in a network using SMB.
EternalBlue Scanner
A Python tool for scanning SMB-enabled devices for the EternalBlue vulnerability (CVE-2017-0144). This script checks whether devices in a network are vulnerable to the EternalBlue exploit by testing SMB connections.
Features
Scans a list of IP addresses for SMB vulnerability.
Detects if the target machine is vulnerable to EternalBlue (CVE-2017-0144).
Parallel processing for scanning multiple devices quickly using ThreadPoolExecutor.
Simple and easy-to-use interface.
Requirements
Python 3.x
impacket library
Installation
Clone this repository:
git clone https://github.com/MedX267/EternalBlue-Vulnerability-Scanner.git
cd EternalBlue-Scanner
Install dependencies:
pip install -r requirements.txt
If you don't have a requirements.txt file, you can manually install Impacket with:
pip install impacket
Usage
Run the script by providing a list of target IP addresses:
python eternalblue_scanner.py <target_ip_1> <target_ip_2> ... <target_ip_n>
Example:
python eternalblue_scanner.py 192.168.1.1 192.168.1.2 192.168.1.3
The script will then check each IP for the EternalBlue vulnerability and display the results.
Output
The script will output whether each target IP is vulnerable or not vulnerable to EternalBlue, and show a summary of the results.
[+] 192.168.1.1 is VULNERABLE to EternalBlue!
[-] 192.168.1.2 is NOT VULNERABLE to EternalBlue.
[-] 192.168.1.3 is not reachable.
License
This tool is provided as-is for educational and testing purposes. Use responsibly and ensure you have proper authorization before scanning networks or devices.
[4.0K] /data/pocs/b54d43d9735c651031b922edf18d4d2c3bd7933c
├── [2.4K] python eternalblue_scanner.py
└── [1.6K] README.md
0 directories, 2 files