[TIL] Learned how to set up a Vulnerable VM

Dong Jun Kim
3 min readJul 29, 2021

Always wanted to learn how to do these after getting started with CTFs and now HTBs, but never tried it on my own. So to get started I went over 20~30 StackOverflow questions and got some of my answers there. The VM will be about setting up an EternalBlue machine!

Setup
To start, I downloaded a Windows 8.1 virtual image and downloaded a couple things onto the machine. First I downloaded and set up OpenSSH which you can find on https://winscp.net/eng/docs/guide_windows_openssh_server. Next up, I enabled SMBv1 then used nmap to check if I could check if any of my ports were open. Note that my account name and password be AAAAA:AAAAA

One file that I made just for verification

VM network settings
To start off, right after I installed my machine, I closed it and changed the network settings from using the NAT networking to Bridged. This made it easier for me since I just needed to run a simple server.

Enabling SMBv1 & Setting up router
After I booted up the machine, I checked to see SMBv1 was enabled. By going to Control Panel -> Programs -> Turn Windows Features on or off, I verified that using SMB v1.0/CIFS File Sharing Support was enabled.

Firewall settings
Since this is a vulnerable machine as well as it’s just a simple VM, I turned Firewall off.

Router Settings
With a laptop using nmap, I tested my public IP address to see if I could access any smb or the ssh ports. However, I could not find any of those ports. After around an hour of searching, I determined that it could be my router settings that blocked my port from being “public”. Another way of how I found out was that I could see one of my ports that I’ve opened port forwarding on nmap to play online Mario Party with a couple friends…

--

--

Dong Jun Kim

A new grad security enthusiast! Interested in reverse engineering, pentesting, and binary exploitations!