MS17010 Bypass Attack


Some of the words

As we all know how to attack the ms17010, now I will tell you a way to bypass the EDR OR AV, of course you can't only use the ETERNALBLUE

At present, the 17010 vulnerability has been detected, protected and blocked in the normal situation. The success rate of the 17010 vulnerability will be greatly reduced when it encounters a protected target host

Many scenarios may be like this (ETERNALBLUE attack), but there may be no way to deal with AV

Actual use

Ms17010 consists of several different vulnerabilities that are exploited in combination with ETERNALCHAMPION and ETERNALROMANCE to bypass EDR OR AV
Attention this way need A user password OR A pipe

Using the public py script we will found the vulnerabilities

[*] TargetIp              192.168.159.143
[*] TargetPort            445
[*] RedirectedTargetIp    (null)
[*] RedirectedTargetPort  0
[*] NetworkTimeout        60
[*] Protocol              SMB
[*] Credentials           Anonymous

[*] Connecting to target...
	[+] Initiated SMB connection

[+] Target OS Version 6.1 build 7601
    Windows Server 2008 R2 Datacenter 7601 Service Pack 1

[*] Trying pipes...
	[-] spoolss    - Not accessible (0xC0000022 - NtErrorAccessDenied)
	[-] browser    - Not accessible (0xC0000022 - NtErrorAccessDenied)
	[+] lsarpc     - Success!

[*] Binding to Rpc to determine architecture
	[+] Target is 64-bit

[Not Supported]
	ETERNALSYNERGY  - Target OS version not supported

[Vulnerable]
	ETERNALBLUE     - DANE
	ETERNALROMANCE  - FB
	ETERNALCHAMPION - DANE/FB

[*] Writing output parameters

[+] Target is vulnerable to 3 exploits
[+] Touch completed successfully

Exec program

When I modify the public script to exec something and use a domain user to auth must be success 

Confirm success like this,

Under current circumstances, ordinary domain users can not end our process, only administrator users to carry out

Online CS

Using the same way must be easy to online cs, but you must be confire your exe can be bypass AV

Add user

A long time ago, there was 17010 in the environment in 2016, but it was not successful. At that time, I thought maybe there was a kill soft, now through this method, you can also bypass AV, like me, directly add an administrator user


Author: Yangsir
Reprint policy: All articles in this blog are used except for special statements CC BY 4.0 reprint policy. If reproduced, please indicate source Yangsir !
  TOC