https://gitlab.com/peterpt/eternal_check
Project moved toEternal Check 2.0
- Eternal Check verifies if an ip is vulnerable to the smb vulnerabilities
- Eternal Blue
- Eternal Romance
- Eternal champion
- Eternal synergy
- Erraticgopher SMB v1 Exploit (Windows XP & Server 2003)
- Eagerlever SMB v1 Exploit (Windows XP & 2000)
Screenshots
Added in 2.0
- Architouch (uses port 49152 "In case opened" in remote ip to retrieve OS architecture)
- RpcTouch (uses also SMB port to retrieve OS version)
Eternal Check Running (Video)
- Eternal Check 1.0 : https://www.youtube.com/watch?v=rQBCELDPiok
- Eternal Check 1.1 : https://www.youtube.com/watch?v=SqIBmAx-Llg
Requirements
-
nmap
-
winbind
-
wine32
-
wget
-
Aditional info in how to install wine 32bit on a 64bit machine : https://wiki.debian.org/Wine to know how to install wine32 on a 64bit machine
Usage
- example 1 : ./echeck
- example 2 : ./echeck 192.68.2.56
Important
- Do not expect much support or any at all
Last Notes (References of these vulnerabilities)
- Erraticgopher smb v1 https://www.vulnerabilitycenter.com/#search=CVE-2017-8461
- https://blogs.forcepoint.com/security-labs/evasions-used-shadow-brokers-tools-danderspritz-and-doublepulsar-part-2-2
- https://blogs.technet.microsoft.com/srd/2017/07/13/eternal-synergy-exploit-analysis/
- https://blogs.technet.microsoft.com/srd/2017/06/29/eternal-champion-exploit-analysis/
- https://en.wikipedia.org/wiki/EternalBlue