Revisiting the case study
We were given an IP address of 192.168.188.129
in order to test against known vulnerabilities. We followed a systematic approach, as follows:
- We created a new workspace using the
workspace –a
command for our test. - We switched to the workspace using the
workspace
[workspace-name]
command. - We initialized a no ping Nmap scan against the target and found numerous open ports.
- The Nmap scan suggested that, on port
445
, an SMB service could be running on Windows 7-Windows 10. - We initiated another Nmap scan, but this time, it was meant for only port
445
. We did this using thesmb-os-discovery
script. - We found that the results suggested that the operating system that's running was Windows 7 SP1 Ultimate edition.
- We knew that Windows 7/Windows Server 2008 are highly vulnerable against CVE-2017-0143, that is, the EternalBlue exploit.
- We initiated another Nmap scan, this time to confirm the presence of the vulnerability...