#cat../scripts/smb_vulns_smb‐vuln‐ms17‐010.nse.txt
#Nmap7.50scaninitiatedMonJul313:57:062017as:nmap‐v‐p139,445‐‐script=smb‐vuln‐
ms17‐010.nse‐iLsmb_server_all.txt‐oNsmb_vulns_smb‐vuln‐ms17‐010.nse.txt
Nmapscanreportfor10.11.1.5
Hostisup(0.24slatency).
PORTSTATESERVICE
139/tcpopennetbios‐ssn
445/tcpopenmicrosoft‐ds
MACAddress:00:50:56:89:35:AF(VMware)
Hostscriptresults:
|smb‐vuln‐ms17‐010:
|VULNERABLE:
|RemoteCodeExecutionvulnerabilityinMicrosoftSMBv1servers(ms17‐010)
|State:VULNERABLE
|IDs:CVE:CVE‐2017‐0143
|Riskfactor:HIGH
|AcriticalremotecodeexecutionvulnerabilityexistsinMicrosoftSMBv1
|servers(ms17‐010).
|
|Disclosuredate:2017‐03‐14
|References:
|https://blogs.technet.microsoft.com/msrc/2017/05/12/customer‐guidance‐for‐wannacrypt‐
attacks/
|https://technet.microsoft.com/en‐us/library/security/ms17‐010.aspx
|_https://cve.mitre.org/cgi‐bin/cvename.cgi?name=CVE‐2017‐0143
......
Nmapscanreportfor10.11.1.220
Hostisup(0.24slatency).
PORTSTATESERVICE
139/tcpopennetbios‐ssn
445/tcpopenmicrosoft‐ds
MACAddress:00:50:56:89:15:14(VMware)
Hostscriptresults:
|smb‐vuln‐ms17‐010:
|VULNERABLE:
|RemoteCodeExecutionvulnerabilityinMicrosoftSMBv1servers(ms17‐010)
|State:VULNERABLE
|IDs:CVE:CVE‐2017‐0143
|Riskfactor:HIGH
|AcriticalremotecodeexecutionvulnerabilityexistsinMicrosoftSMBv1
|servers(ms17‐010).
|
|Disclosuredate:2017‐03‐14
|References:
|https://blogs.technet.microsoft.com/msrc/2017/05/12/customer‐guidance‐for‐wannacrypt‐
attacks/
|https://technet.microsoft.com/en‐us/library/security/ms17‐010.aspx