• Stars
    star
    118
  • Rank 299,923 (Top 6 %)
  • Language
    Shell
  • Created over 6 years ago
  • Updated about 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever

Project moved to https://gitlab.com/peterpt/eternal_check

Eternal Check 2.0

  • Eternal Check verifies if an ip is vulnerable to the smb vulnerabilities
  • Eternal Blue
  • Eternal Romance
  • Eternal champion
  • Eternal synergy
  • Erraticgopher SMB v1 Exploit (Windows XP & Server 2003)
  • Eagerlever SMB v1 Exploit (Windows XP & 2000)

Screenshots

Added in 2.0

  • Architouch (uses port 49152 "In case opened" in remote ip to retrieve OS architecture)
  • RpcTouch (uses also SMB port to retrieve OS version)

Eternal Check Running (Video)

Requirements

  • nmap

  • winbind

  • wine32

  • wget

  • Aditional info in how to install wine 32bit on a 64bit machine : https://wiki.debian.org/Wine to know how to install wine32 on a 64bit machine

Usage

  • example 1 : ./echeck
  • example 2 : ./echeck 192.68.2.56

Important

  • Do not expect much support or any at all

Last Notes (References of these vulnerabilities)

Last version 1.1