0 0
Read Time:1 Minute, 11 Second

SMB Remote Windows Kernel Pool vulnerability. It infects Windows operating systems by having port 445 open on the device’s IP

Exploitation by metasploit
exploit/windows/smb/ms17_010_eternalblue

After you hack the infected device via port 445, a shell session will be opened. You can use the Cobalt Strike tool. To convert the shell session to Session meterpreter and full device control.

How to get infected devices?
Simply, you can from the shodan.io website, search for the loophole, reveal millions of devices.

212.150.222.133
5.100.255.75
79.180.103.227
37.25.34.1
62.90.226.31
82.81.56.74
87.71.43.181
185.28.154.208
212.117.145.194
79.177.2.99

Ips مهمه داخل الكيان الصهيوني مصابه في SMB
يعني تقدر ببساطه تتحكم في السيرفر وتخترق الشبكه بعديها بسهوله

1to1.org.il
avivhatora.org
betdin.de
chabad.de
chabadnorthtelaviv.org.il
chabadonweb.com
chamah.net
chasidut.tv
cow.org.il
ganhanni.com
he.chabad.de
ifathilel.co.il
israelim.ru
kolnessziona.co.il
ns1.dtnt.info.1to1.org.il
oroshelyoseph.org
shiftmedia.co.il
shulchanharav.com
support.dtnt.com.1to1.org.il
thejewishpassport.org
http://www.avivhatora.org
http://www.baalhatanya.org
http://www.betdin.de
http://www.chabadnorthtelaviv.org.il
http://www.chabadonweb.com
http://www.chamah.net
http://www.chasidut.tv
http://www.cow.org.il
http://www.ifathilel.co.il
http://www.israelim.ru
http://www.kolnessziona.co.il
http://www.oroshelyoseph.org
http://www.shiftmedia.co.il
http://www.shulchanharav.com
http://www.thejewishpassport.org
bzq-79-180-103-227.red.bezeqint.net
62-90-226-31.barak.net.il
msv001.co.il
tovena.co.il
http://www.msv001.co.il
bzq-82-81-56-74.red.bezeqint.net
bzq-79-177-2-99.red.bezeqint.net

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence