Attacking Windows Platform with EternalBlue Exploit via Android Phones | MS17-010

Image
Introduction On 14 April 2017, a hacker group know by the name of Shadow Brokers leaked exploitation toolkit used by the National Security Agency (NSA). The leak was also used as part of a worldwide WannaCry ransomware attack. EternalBlue is also an exploit developed and used by the NSA according to former NSA employees. Lab Environment Target Machine: Windows 7 Ultimate x64 bit Attacker Machine: Android 5.1  What is EternalBlue EternalBlue actually exploits a vulnerability found in Server Message Block (SMB) protocol of Microsoft Windows various platforms. This vulnerability can be found under CVE-2017-0144 in the CVE catalog.The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server. Windows 7 Operating with Release Effected by EternalBlue Installing Metasploit Framework on Android Step 1: Download Termux from play store....

Introduction To Reverse engineering

REVERse Engineering

In this blog we are just understanding what is Reverse Engineering we Do the practical of this also.


 Reverse Engineering is the Combination of Two Entities :- 
 1.   Reverse
     2.  Engineering
  
    Reverse Engineering is ALSO know as the Back Engineering.
     
     Reverse Engineering is Also very important in crime Prevention.

     By this we learn how to crack the trial Software into the paid one.
   
   Lets understand the term Reverse Engineering
    
    Engineering -- The goal of the Engineering is to develop or build something. In software Development we have to deal with variables , loops , constructors , destructors , Switch statements and so on.


   Reverse Engineering -- Is a process in which we try to reverse the development process and try to understand the already developed things in pieces. In reverse Engineering we have to deal with registers , Flip flops , EIP(Instruction pointer) , ESP(Stack Pointer) and high path combination.


   For more About Reverse Engineering you can go through Wikipedia..


    For doing this we Require :-
    
   -> Ollydbg Tool
    
    ->Window Xp any service pack
    
   -> Assembly language knowledge (not required much so if you dont have then still its ok)

   -> Target Application

   In Next Blog we will do the Practical of Reverse Engineering!!!!!!!!!!!!!!!

Comments

Popular posts from this blog

Practical of XSS cross site attack

Self-driving Cars Can be hacked by just putting stickers on street signs

New Features Of WhatsApp Comming Soon!