Skip to content

Commit 9e691b6

Browse files
committed
Added README
1 parent 751e602 commit 9e691b6

File tree

2 files changed

+20
-1
lines changed

2 files changed

+20
-1
lines changed

Form1.cs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,6 @@ public partial class Form1 : Form
1616
public Form1()
1717
{
1818
InitializeComponent();
19-
//Tester.TestIP("192.168.122.107");
2019
}
2120

2221
private void button1_Click(object sender, EventArgs e) {

README.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
MS017-010 Tester
2+
================
3+
4+
Tester for MS017-010 Exploit Vulnearbility. Based on https://github.com/nixawk/labs/blob/master/MS17_010/smb_exploit.py
5+
6+
## References
7+
8+
https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/
9+
https://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_ms17_010
10+
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb
11+
https://www.symantec.com/security_response/vulnerability.jsp?bid=96707
12+
https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-SMB2/[MS-SMB2]-151016.pdf
13+
https://msdn.microsoft.com/en-us/library/windows/desktop/aa365233(v=vs.85).aspx
14+
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
15+
https://community.rapid7.com/community/metasploit/blog/2017/04/03/introducing-rubysmb-the-protocol-library-nobody-else-wanted-to-write
16+
https://msdn.microsoft.com/en-us/library/ee441741.aspx
17+
https://github.com/countercept/doublepulsar-detection-script/blob/master/detect_doublepulsar_smb.py
18+
http://stackoverflow.com/questions/38735421/packing-an-integer-number-to-3-bytes-in-python
19+
https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html
20+

0 commit comments

Comments
 (0)