Erez admits that his tool is not as advanced as NMap, Metasploit or other tools, but he intends to create a simple tool, with just one click to solve the problem, discover a hole Eternal Blue for users to know.
The subject of Eternal Blues are system administrators who know how WannaCry and NotPetya can attack computers and want to know if their computer network is vulnerable to updates when needed.
Anonymous data collection tool
Remember that this tool uses Google Analytics to collect anonymous data. The information obtained includes the number of scanned computers and the number of computers detected by each vulnerability. Erez said that the tool did not retrieve the hostname (hostname), IP address and other personal data.
Sharing with Bleeping Computer, Erez said that he will share some static data in the future. 'To date, there have been more than 350 scans from 50 countries in less than 24 hours.' Erez is currently the creative director at Imperva and created this tool as a personal project. Users can report bugs and download Eternal Blues on his personal blog site.
if you've ever contacted microsoft support to get windows or windows server issues resolved, you've probably been guided through the microsoft support diagnostic tool (msdt). ).
the metasploit framework is an environment used to test, attack, and exploit service errors. metasploit is built from perl object-oriented language, with components written in c, assembler, and python. metasploit can run on most operating systems: linux, windows, macos.
the free wannacry malware checking tool is released from bkav, capable of checking whether a computer contains an eternalblue vulnerability. this is the flaw that wannacry took advantage of to invade the computer.
the software testing process involves two different types of testing - manual and automatic. there are obvious differences between these types of tests. manual testing requires time and effort to make sure the software code does everything.
a new windows search vulnerability can be exploited to automatically open a search window containing remotely hosted malicious executable files just by launching a word document.