Eternal Blues -- EternalBlue Network Vulnerability Scanner

Discussion in 'other software & services' started by hawki, Jun 30, 2017.

  1. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    "Eternal Blues is a free EternalBlue vulnerability scanner. It helps finding the blind spots in your network, these endpoints that are still vulnerable to EternalBlue..."

    http://omerez.com/eternalblues/
     
  2. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    I run that thing to death today. All No's :thumb:
     
  3. trott3r

    trott3r Registered Member

    Joined:
    Jan 21, 2010
    Posts:
    1,283
    Location:
    UK
    Ran the scanner on XP Pro SP3 after the MS patch installed and rebooted and it still says it is vulnerable. :(
     
  4. clubhouse1

    clubhouse1 Registered Member

    Joined:
    Sep 26, 2013
    Posts:
    1,124
    Location:
    UK
    No dreaded lurgy here:eek:
     
  5. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    The developer reports that the thing is giving false positives. Look at the bottom of the utility webpage.

    Does it even support XP ?
     
  6. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,879
    Ran check on Windows 10... no vulnerabilities found! :)
     
  7. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,803
    Location:
    .
    Here on Win8.1, zero vuln.
     
  8. login123

    login123 Registered Member

    Joined:
    Jul 12, 2007
    Posts:
    184
    xp sp3 here patch not applied, shows port 203 vulnerable.

    edit: shows 203 something vulnerable, not sure if that means a port.
    Several other scanners show all ports closed.
     
    Last edited: Jul 1, 2017
  9. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,879
    It doesn't support XP but with your latest patch, your SMB vulnerability should be addressed.

    Home users shouldn't worry about it since they never run SMB.

    Corporate and institutional users are more susceptible.
     
  10. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    There is some old hardware like printers and wifi speakers that use SMBv1. However, if the system is behind a NAT router, SMBv1 enabled does not present a high risk. It's the client-server configuration that is the real killer - and as you state, very few home user systems are configured as such.

    This whole SMB thing is blown way out of proportion by those that lack understanding.
     
  11. guest

    guest Guest

    +1
    +2
     
  12. ArchiveX

    ArchiveX Registered Member

    Joined:
    Apr 7, 2014
    Posts:
    1,501
    Location:
    .
    +1 :thumb:
     
  13. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,803
    Location:
    .
  14. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,879
    I have a Zyxel modem/router so I'm behind a NAT router. If you have a secured network, SMBv1 enabled isn't a high risk.

    A broadband modem also doubles as a router and typically displays a connection as 192.168.0.1 - as mine does. That means one is behind a hardware firewall and what is displayed is the local protocol that connects to the Internet - NAT means Network Address Translation.
     
    Last edited: Jul 2, 2017
  15. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Eset has a scanner to verify if EternalBlue patch has been installed:
    https://help.eset.com/eset_tools/ESETEternalBlueChecker.exe
     
  16. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,803
    Location:
    .
    Thanks.

    I got srv2.sys instead of srv.sys which this utility is looking for. This legend is what I get when executing ESETEternalBlueChecker.exe:

    Code:
    ESET CVE-2017-0144 vulnerability checker
    Copyright 1992-2017 ESET spol. s r.o.
    
    Checking your system for CVE-2017-0144 vulnerability.
    Failed to get version of 'C:\Windows\system32\Drivers\srv.sys'.
    We are unable to tell if your computer is vulnerable.
    
    Press any key to close this application ...
    
    srv2.sys properties.png
     
  17. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Did you uninstall/disable SMBv1 from your system? Appears that is the case.
     
  18. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,365
    Location:
    Italy
    TH.
    Works perfectly with XP



    1.JPG

    :thumb:
     
  19. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    Same as you on my home insider build. will try later on my Enterprise VM build later
     

    Attached Files:

  20. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,803
    Location:
    .
    Yes I did.

    Wonder what the tool's output is when SMBv1 is installed though. On a patched and non-patched system.
     
  21. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    See reply #18.
     
  22. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,803
    Location:
    .
    Thanks, I missed that one.
     
  23. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,694
    Location:
    USA
  24. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,803
    Location:
    .
    Last edited: Jul 4, 2017
  25. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,694
    Location:
    USA
    Sorry, it is. I missed that post.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.