BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/4515954279055360/lesson/e3e92fdeeb385054c3e8d7fa7d9e1433?ref=outlook-calendar
SUMMARY:Video and lab - Scanning for WannaCry Ransomware
DTSTART;TZID=America/Los_Angeles:20260501T190000
DTEND;TZID=America/Los_Angeles:20260501T200000
LOCATION:https://www.learndesk.us/class/4515954279055360/lesson/e3e92fdeeb385054c3e8d7fa7d9e1433?ref=outlook-calendar
DESCRIPTION: EternalBlue, sometimes written as ETERNALBLUE, is an exploit believed to have been developed by the U.S. National  Security Agency (NSA). It was leaked by the Shadow Brokers hacker group  on April 14, 2017, and was used as part of the worldwide WannaCry  ransomware attack on May 12, 2017.

For this lab, students will be using NMap to look for the vulnerability. EternalBlue  exploits a vulnerability in Microsoft's implementation of the Server  Message Block (SMB) protocol. This vulnerability is denoted by entry  CVE-2017-0144 in the Common Vulnerabilities and Exposures (CVE) catalog.  The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows accepts specially crafted packets from remote attackers, allowing them to execute arbitrary code on the target computer.

https://www.learndesk.us/class/4515954279055360/lesson/e3e92fdeeb385054c3e8d7fa7d9e1433?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR