Eternal Synergy Exploit Analysis

Introduction Introduction Recently we announced a series of blog posts dissecting the exploits released by the ShadowBrokers in April 2017; specifically some of the less explored exploits. This week we are going to take a look at Eternal Synergy, an SM…

Introduction Introduction Recently we announced a series of blog posts dissecting the exploits released by the ShadowBrokers in April 2017; specifically some of the less explored exploits. This week we are going to take a look at Eternal Synergy, an SMBv1 authenticated exploit. This one is particularly interesting because many of the exploitation steps are purely packet-based, as opposed to local shellcode execution.


Print Share Comment Cite Upload Translate
APA
() » Eternal Synergy Exploit Analysis. Retrieved from https://www.truth.cx/2017/07/13/eternal-synergy-exploit-analysis/.
MLA
" » Eternal Synergy Exploit Analysis." - , https://www.truth.cx/2017/07/13/eternal-synergy-exploit-analysis/
HARVARD
» Eternal Synergy Exploit Analysis., viewed ,
VANCOUVER
- » Eternal Synergy Exploit Analysis. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2017/07/13/eternal-synergy-exploit-analysis/
CHICAGO
" » Eternal Synergy Exploit Analysis." - Accessed . https://www.truth.cx/2017/07/13/eternal-synergy-exploit-analysis/
IEEE
" » Eternal Synergy Exploit Analysis." [Online]. Available: https://www.truth.cx/2017/07/13/eternal-synergy-exploit-analysis/. [Accessed: ]
Select a language: