Start interactive tutorial

← Back to Projects

Eternal blue - Remote Access on Windows 7

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

    red team

  • owasp-a05-security-misconfiguration

  • smb

  • metasploit

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

🌱 How to start this lab

In this lab, you will face a Windows 7 system vulnerable to the infamous EternalBlue exploit—a historic vulnerability that was leveraged in multiple large-scale real-world attacks.

Your mission is to assess the system’s exposure, identify weaknesses in its network services, and, if deemed viable, gain remote access to the machine in order to analyze its internal contents.

🌱 How to start this lab

Follow these instructions to begin:

  1. Download the virtual machine from this link:
We are sorry, you don't have enough privileges to access this block of content, please signup or upgrade your plan to access it.
1https://storage.googleapis.com/cybersecurity-machines/Windows%207.ova
  1. Import the machine into your preferred virtualization software like VirtualBox.
  2. To perform this lab, you will need an additional virtual machine to act as your attacking environment. This machine must have cybersecurity tools. We recommend using Kali Linux.
    • Download the pre-built Kali Linux virtual machine image from its official website. Use the "Virtual Machines" option from this link.
  3. Once the machine is started, you can begin the lab!

You may rely on the following tools during your analysis:

  • Nmap, Netdiscover, ARP-scan – for network and service discovery
  • Metasploit Framework – for assessing and exploiting known vulnerabilities
  • SMBClient, Impacket – for interacting with SMB services

Remember: This type of vulnerability changed the history of cybersecurity. Use it responsibly!

Happy hacking!

Sign up and get access to solution files and videos for free

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Sign up and get access to solution files and videos for free

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies