SMB Remote Windows Kernel Pool vulnerability. It infects Windows operating systems by having port 445 open on the device’s IP
Exploitation by metasploit
exploit/windows/smb/ms17_010_eternalblue
After you hack the infected device via port 445, a shell session will be opened. You can use the Cobalt Strike tool. To convert the shell session to Session meterpreter and full device control.
How to get infected devices?
Simply, you can from the shodan.io website, search for the loophole, reveal millions of devices.
212.150.222.133
5.100.255.75
79.180.103.227
37.25.34.1
62.90.226.31
82.81.56.74
87.71.43.181
185.28.154.208
212.117.145.194
79.177.2.99
Ips مهمه داخل الكيان الصهيوني مصابه في SMB
يعني تقدر ببساطه تتحكم في السيرفر وتخترق الشبكه بعديها بسهوله
1to1.org.il
avivhatora.org
betdin.de
chabad.de
chabadnorthtelaviv.org.il
chabadonweb.com
chamah.net
chasidut.tv
cow.org.il
ganhanni.com
he.chabad.de
ifathilel.co.il
israelim.ru
kolnessziona.co.il
ns1.dtnt.info.1to1.org.il
oroshelyoseph.org
shiftmedia.co.il
shulchanharav.com
support.dtnt.com.1to1.org.il
thejewishpassport.org
http://www.avivhatora.org
http://www.baalhatanya.org
http://www.betdin.de
http://www.chabadnorthtelaviv.org.il
http://www.chabadonweb.com
http://www.chamah.net
http://www.chasidut.tv
http://www.cow.org.il
http://www.ifathilel.co.il
http://www.israelim.ru
http://www.kolnessziona.co.il
http://www.oroshelyoseph.org
http://www.shiftmedia.co.il
http://www.shulchanharav.com
http://www.thejewishpassport.org
bzq-79-180-103-227.red.bezeqint.net
62-90-226-31.barak.net.il
msv001.co.il
tovena.co.il
http://www.msv001.co.il
bzq-82-81-56-74.red.bezeqint.net
bzq-79-177-2-99.red.bezeqint.net