CG
SkillsExploiting Ms17 010 Eternalblue Vulnerability
Start Free
Back to Skills Library
Red Team & Offensive Security🔴 Advanced

Exploiting Ms17 010 Eternalblue Vulnerability

Leverage MS17-010 (EternalBlue) — critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it.

3 min read3 MITRE techniques

MITRE ATT&CK Coverage

T1210T1190T1569.002

Exploiting MS17-010 EternalBlue Vulnerability

Overview

MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it was used in the WannaCry and NotPetya ransomware campaigns. Despite patches being available since March 2017, many organizations still have unpatched systems, making it a viable red team exploitation vector especially in legacy environments.

MITRE ATT&CK Mapping

  • T1210 - Exploitation of Remote Services
  • T1190 - Exploit Public-Facing Application
  • T1569.002 - System Services: Service Execution

Implementation Steps

Phase 1: Vulnerability Scanning

  1. Scan target networks for SMB port 445
  2. Check for SMBv1 protocol support
  3. Run MS17-010 vulnerability check (Nmap NSE script or Metasploit auxiliary)
  4. Document vulnerable systems with OS version and patch level

Phase 2: Exploitation

  1. Select appropriate exploit variant based on target OS
  2. Configure exploit payload (Meterpreter, Cobalt Strike beacon, custom shellcode)
  3. Execute exploit against confirmed vulnerable target
  4. Verify code execution and establish session

Phase 3: Post-Exploitation

  1. Establish persistence on compromised system
  2. Dump credentials from memory
  3. Use compromised host as pivot point
  4. Document exploitation evidence

Tools and Resources

ToolPurpose
Nmap ms-17-010 NSE scriptsVulnerability detection
Metasploit ms17_010_eternalblueExploitation module
Metasploit ms17_010_psexecAlternative exploitation
AutoBlue-MS17-010Standalone Python exploit
CrackMapExecMass SMB vulnerability scanning

Detection Indicators

  • IDS/IPS signatures for EternalBlue exploit traffic
  • SMBv1 negotiation from unusual source hosts
  • Event ID 7045: New service installation after exploitation
  • Anomalous named pipe activity on SMB
  • Large SMB write requests characteristic of buffer overflow

Validation Criteria

  • [ ] Vulnerable systems identified via scanning
  • [ ] Exploitation achieved on authorized target
  • [ ] Code execution confirmed with session established
  • [ ] Post-exploitation activities documented
  • [ ] Remediation recommendations provided

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC4.1 (Monitoring & Evaluation), CC7.1 (Monitoring)
  • ISO 27001: A.14.2 (Secure Development), A.18.2 (Information Security Reviews)
  • NIST 800-53: CA-8 (Penetration Testing), RA-5 (Vulnerability Scanning)
  • NIST CSF: ID.RA (Risk Assessment), PR.IP (Information Protection)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add exploiting-ms17-010-eternalblue-vulnerability

# Or load dynamically via MCP
grc.load_skill("exploiting-ms17-010-eternalblue-vulnerability")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add exploiting-ms17-010-eternalblue-vulnerability
// Or via MCP
grc.load_skill("exploiting-ms17-010-eternalblue-vulnerability")

Tags

red-teamadversary-simulationmitre-attackexploitationpost-exploitationeternalbluesmbremote-code-execution

Related Skills

Red Team & Offensive Security

Exploiting Active Directory with BloodHound

3m·advanced
Red Team & Offensive Security

Performing Kerberoasting Attack

3m·advanced
Red Team & Offensive Security

Performing Privilege Escalation on Linux

3m·advanced
Red Team & Offensive Security

Conducting Pass the Ticket Attack

3m·intermediate
Red Team & Offensive Security

Conducting Spearphishing Simulation Campaign

3m·intermediate
Red Team & Offensive Security

Executing Red Team Engagement Planning

3m·intermediate

Skill Details

Domain
Red Team & Offensive Security
Difficulty
advanced
Read Time
3 min
Code Examples
0
MITRE IDs
3

On This Page

OverviewMITRE ATT&CK MappingImplementation StepsTools and ResourcesDetection IndicatorsValidation CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →