skills/mukul975/anthropic-cybersecurity-skills/exploiting-ms17-010-eternalblue-vulnerability/Gen Agent Trust Hub
exploiting-ms17-010-eternalblue-vulnerability
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyexecutes thenmapcommand-line utility viasubprocess.check_outputto perform vulnerability scans against target systems. Additionally,references/workflows.mdprovides specific commands for establishing persistence on compromised hosts using Meterpreter. - [REMOTE_CODE_EXECUTION]: The skill is specifically designed to facilitate remote code execution on vulnerable systems. It provides functional Python scripts for vulnerability verification and comprehensive documentation for using the Metasploit Framework to achieve RCE via the EternalBlue vulnerability.
- [EXTERNAL_DOWNLOADS]: The
scripts/process.pyscript identifies dependencies on external Python packages such asimpacketandrich, which are required for SMB protocol interaction and reporting. The documentation also references the use of external tools likemsfconsoleandcrackmapexec. - [DATA_EXFILTRATION]: The skill includes detailed instructions and commands for harvesting sensitive data from compromised remote systems, such as dumping memory-resident credentials, password hashes, and Kerberos tickets using Metasploit modules like
kiwiandhashdump. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection through its processing of untrusted input data:
- Ingestion points: Target identifiers (IP addresses and CIDR ranges) are ingested via command-line arguments in
scripts/agent.pyandscripts/process.py. - Boundary markers: Absent. The skill does not implement delimiters or safety instructions to prevent the agent from being influenced by potentially malicious content embedded in target data strings.
- Capability inventory: The skill utilizes raw network
socketsfor protocol negotiation andsubprocessto execute external binary tools. - Sanitization: The
scripts/process.pyfile uses theipaddresslibrary to validate CIDR format, providing basic structural validation for network input.
Audit Metadata