Use auxiliary for smb service
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-5-1024x55.png)
Set options to target host
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-6-1024x473.png)
Scan target
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-7-1024x110.png)
Use ms17_010_eternalblue module
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-8-1024x74.png)
exploit
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-9-1024x490.png)
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-10-1024x480.png)
Victim desktop
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-11.png)
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-12.png)
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-13-1024x423.png)
Change directory and view contents of victim machine
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-14-1024x679.png)
View contents of victim files
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-15.png)
Copy victim files to attack machine
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-16-1024x201.png)
verify files copied to attacker machine
![](https://www.netprojnetworks.com/wp-content/uploads/2021/01/image-17.png)