Overview
Blue is a beginner-friendly Windows machine on TryHackMe that teaches exploitation of the MS17-010 (EternalBlue) vulnerability — the same exploit used in the devastating WannaCry ransomware attack of 2017.
Recon
|
|
Key findings:
- Port 135 (MSRPC)
- Port 139 (NetBIOS)
- Port 445 (SMB) — Microsoft Windows 7 Professional
- SMB signing disabled
Enumeration
Ran Nmap’s vuln scripts against SMB:
|
|
Confirmed the target is vulnerable to MS17-010 (EternalBlue).
Exploitation
Launched Metasploit and used the EternalBlue exploit:
|
|
The exploit succeeded, providing a Meterpreter session with NT AUTHORITY\SYSTEM privileges — the highest level on Windows.
Post-Exploitation
Hashdump
|
|
Dumped all password hashes from the SAM database. Cracked the admin hash using John:
|
|
Flag Capture
Used the Meterpreter search command to find all flag files:
|
|
Flag 1:
flag{access_the_machine}
Flag 2:
flag{sam_database_elevated_access}
Flag 3:
flag{admin_documents_can_be_valuable}
Flags
flag{access_the_machine}flag{sam_database_elevated_access}flag{admin_documents_can_be_valuable}
Key Takeaways
- EternalBlue remains one of the most impactful vulnerabilities in history
- Always patch systems — MS17-010 has had a fix since March 2017
- SMB should never be exposed to the internet
- Meterpreter provides powerful post-exploitation capabilities for further assessment