Post

Blue

The exploration of box “Blue” involved several critical steps. It started with scanning for open ports using the nmap tool, identifying key services like FTP and SMB. Although FTP access was refused, the SMB service was found vulnerable to the MS17-010 exploit, commonly known as EternalBlue. Exploitation was carried out using Metasploit, specifically the exploit/windows/smb/ms17_010_eternalblue module. After setting the necessary parameters, a successful shell was obtained with privileged access, leading to root access. This process included network vulnerability exploitation and privilege escalation, culminating in full system control.

Overview

graph TD
    A[Inteligence Gathering]
    A --> B[Port Scan > Ports 21,445]
    B --> C[Enumeration: SMB Service > MS17-010]
    C --> D[Exploitation > EternalBlue > Root Access]
 

1. Intelligence Gathering

Port Scan

1
nmap --top-ports=10 -Pn -T4 10.10.10.40

Untitled

Service versions

Untitled

2. Enumeration

Port 21

Untitled

connection refused

Port 445

Untitled

Script for the vulnerability (nmap)

1
nmap -p 139,443,445 10.10.10.40 --script smb-vuln-ms17-010

Untitled

Search for an exploit for vulnerability CVE-2017-0143

Untitled

3. Exploitation

Open the Metasploit framework and search for ms17-010

Untitled

Use the exploit exploit/windows/smb/ms17_010_eternalblue

Untitled

Set the information for the exploit.

Untitled

I already have the shell with privileged access

Root Access

Untitled

This post is licensed under CC BY 4.0 by the author.