Jan. 29, 2024, 2:10 a.m. | Aleksey Novokhrestov, Anton Kalyakin, Aleksandr Kovalenko, Vladimir Repkin

cs.CR updates on arXiv.org arxiv.org

The creation of a vulnerable node has been demonstrated through the analysis
and implementation of the MS17-010 (CVE-2017-0144) vulnerability, affecting the
SMBv1 protocol on various Windows operating systems. The principle and
methodology of exploiting the vulnerability are described, with a formalized
representation of the exploitation in the form of a Meta Attack Language (MAL)
graph. Additionally, the attacker's implementation is outlined as the execution
of an automated script in Python using the Metasploit Framework. Basic security
measures for systems utilizing …

analysis arxiv cve exploitation exploiting implementation methodology node operating systems protocol representation smbv1 systems vulnerability vulnerable windows

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States