Hacking Windows — Ethical Hacking as a Beginner [13]

Bhavyansh @ DiversePixel
1 min readApr 30, 2024

In this article let’s see some of the vulnerabilities that were discovered in Windows machines.

Understanding SMB Protocol

The Server Message Block (SMB) protocol, operating over ports 139 and 445, is a cornerstone of Windows networking. By default, these ports are open, presenting an entry point for potential attackers. One infamous exploit targeting SMB is the EternalBlue attack.

The EternalBlue Exploit

EternalBlue exploits a mathematical error in the SMB protocol, allowing attackers to execute arbitrary code remotely without authentication. Leveraging tools like Metasploit, ethical hackers can assess if a target is vulnerable. Using msfconsole, one can search for the EternalBlue exploit module (use auxiliary/scanner/smb/smb_ms17_010) and execute it against a target machine. Subsequently, the exploit/windows/smb/ms17_010_eternalblue module can be utilized to launch the attack.

DoublePulsar and SMBGhost Exploitation

Similar to EternalBlue, DoublePulsar and SMBGhost (CVE-2020–0796) exploits target vulnerabilities in the SMB protocol. Ethical hackers can leverage analogous methodologies to assess and exploit these vulnerabilities, employing tools such as Metasploit for reconnaissance and execution.

BlueKeep Vulnerability

Another critical vulnerability in Windows systems is BlueKeep (CVE-2019–0708), affecting the Remote Desktop Protocol (RDP) on port 3389. To ethically assess and exploit this vulnerability, one can utilize Metasploit to scan for susceptible targets (auxiliary/scanner/rdp/cve_2019_0708_bluekeep) and subsequently execute the exploit (exploit/windows/rdp/cve_2019_0708_bluekeep).

These are the most (in)famous Windows exploits that were patched in upcoming releases. We now know why regularly updating windows and keeping firewall turned on is important.

Check for yourself and stay protected!

--

--

Bhavyansh @ DiversePixel

Welcome to my Medium page! Find technical insights on Full Stack Web Development and Cyber Security here. I hope you gain value from my tech learnings. 🚀