npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it was used in the WannaCry and NotPetya ransomware campaigns. Despite patches being available since March 2017, many organizations still have unpatched systems, making it a viable red team exploitati...
Guides authorized red team exploitation of MS17-010 EternalBlue SMBv1 vulnerability, covering scanning with Nmap, execution via Metasploit/Python, and post-exploitation.
Guides red-teaming exploitation of MS17-010 EternalBlue SMBv1 vulnerability: scanning with Nmap, exploiting via Metasploit/AutoBlue, post-exploitation persistence.
Identifies and exploits SMB vulnerabilities using Metasploit during authorized pentests, targeting unpatched Windows systems, misconfigured shares, and weak authentication in networks.
Share bugs, ideas, or general feedback.
MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it was used in the WannaCry and NotPetya ransomware campaigns. Despite patches being available since March 2017, many organizations still have unpatched systems, making it a viable red team exploitation vector especially in legacy environments.
| Tool | Purpose |
|---|---|
| Nmap ms-17-010 NSE scripts | Vulnerability detection |
| Metasploit ms17_010_eternalblue | Exploitation module |
| Metasploit ms17_010_psexec | Alternative exploitation |
| AutoBlue-MS17-010 | Standalone Python exploit |
| CrackMapExec | Mass SMB vulnerability scanning |