SMB Remote Windows Kernel Pool vulnerability. It infects Windows operating systems by having port 445 open on the device’s IP

Exploitation by metasploit

After you hack the infected device via port 445, a shell session will be opened. You can use the Cobalt Strike tool. To convert the shell session to Session meterpreter and full device control.

How to get infected devices?
Simply, you can from the website, search for the loophole, reveal millions of devices.

Ips مهمه داخل الكيان الصهيوني مصابه في SMB
يعني تقدر ببساطه تتحكم في السيرفر وتخترق الشبكه بعديها بسهوله

By Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service