Expected output: Here, we launched a CVE scan against port 8443, but you can query other ports, or the entire site as well. DESCRIPTION: This script will use a custom NMap NSE script to scan a destination host on: port 445 for the MS17-010 vulnerability. Scans a host or network for the MS17-010 vulnerability and output results as a : table that you can pipe to other PowerShell functions such as Invoke-Command or: Export-CSV.. NSE: [smb-vuln-ms17-010 192.168.1.9] SMB: Extended login to 192.168.1.9 as USER\guest failed, but was given guest access (username may be wrong, or system may only allow guest) [NSE] smb-vuln-ms17-010.nse: Script to detect ms17-010 (smb-vuln-ms17-010) From: Paulino Calderon
... win7 machine and it works as expected but I suspect there might be some issues with newer Windows versions and certain smb configurations (v2 authentication protocols with signing enabled). local nmap = require "nmap" local smb = require "smb" local vulns = require "vulns" local stdnse = require "stdnse" local string = require "string" description = [[ Attempts to detect if a Microsoft SMBv1 server is vulnerable to a remote code execution vulnerability (ms17-010, a.k.a.
An attacker who successfully exploited the vulnerabilities could gain the ability to execute code on the target server. NMAP MS17-010 script. If the host is not online or is blocking If you’re using the command line version of NMap on any system, you can run this command (change the IP range to meet your needs): nmap -sC -p 445 --script smb-vuln-ms17-010.nse 192.168.1.0/24. In order for the check to work it needs access to at least one shared printer on the remote system.
Archived. NSE: [smb-vuln-ms17-010 192.168.1.9] SMB: WARNING: the server appears to be Unix; your mileage may vary. u/xbadazzx. NMAP MS17-010 script . local nmap = require "nmap" local smb = require "smb" local vulns = require "vulns" local stdnse = require "stdnse" local string = require "string" description = [[ Attempts to detect if a Microsoft SMBv1 server is vulnerable to a remote code execution vulnerability (ms17-010, a.k.a. Updated July 29, 2017. The script checks for the vuln in a safe way without a possibility of crashing the remote system as this is not a memory corruption vulnerability. smb-vuln-ms17-010.sharename . EternalBlue). 1. Here we only scan port 445 which is the smb file sharing port.--script smb-vuln-ms17-010: This indicates that the MS17-010 script should be executed on every found open port.-oN ms17-010: Output scan in normal format to the given filename (in this case the filename will be ms17-010.nmap; 192.168.1.17: This indicates the machine to scan.