013#:HTB - Blue

Blue - Title Card

     That last room went pretty fast and I have a feeling this one might too. Judging by the name (and popularity of the room) I’m guessing we will be abusing Eternal Blue for this room. But let’s get started and find out.

     It looks like the most interesting things here are msrpc and SMB. I feel like I cheated a bit here. I jumped to just trying to Metasploit module for Eternal Blue right off the bat and it worked. This also happens to get us NT SYSTEM\AUTHORITY, so that is the whole room!

Blue - Flag 1
Blue - Flag 2

     This room ended up being so easy I felt silly even making an article about it. But with the way I do the rough draft for these things it was basically done anyway, so why not. In case you don’t know the history of Eternal Blue, you should give that article a read! Interesting origins in the NSA and a government data breach. This exploit found its way into the WannaCry ransomware attacks that were bringing businesses to their knees in 2017. It was also used in the infamous Petya ransomware.

[CATZ....HACKS]

:::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] :::::::: [CATZ .... HACKS] ::::::::