Skip to content

FrostsaberX/CVE-2019-0708

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2019-0708

CVE-2019-0708 with Metasploit-Framework

CVE-2019-0708漏洞是通过检查用户的身份认证,导致可以绕过认证,不用任何的交互,直接通过rdp协议进行连接发送恶意代码执行命令到服务器中去。如果被攻击者利用,会导致服务器入侵,中病毒,像WannaCry 永恒之蓝漏洞一样大规模的感染。

2019年9月7日晚上凌晨1点左右,metaspolit更新了漏洞利用程序。

Usage:


0x01 环境搭建

Terminal执行

apt install metasploit-framework

cp rdp.rb /usr/share/metasploit-framework/lib/msf/core/exploit/

cp rdp_scanner.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/

cp cve_2019_0708_bluekeep_rce.rb /usr/share/metasploit-framework/modules/exploits/windows/rdp/

cp cve_2019_0708_bluekeep.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/

0x02 操作方法

1.用windwos/rdp/cve_2019_0708_bluekeep_rce模块

2.设置RHOSTS以及target(如果靶机使用vmare target设置为3)

0 Automatic targeting via fingerprinting
1 Windows 7 SP1 / 2008 R2 (6.1.7601 x64)
2 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Virtualbox)
3 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare)
4 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Hyper-V)

3. 运行exp

About

CVE-2019-0708 With Metasploit-Framework Exploit

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages