Skip to content

modulexcite/bluekeep_CVE-2019-0708_poc_to_exploit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

bluekeep_CVE-2019-0708_poc_to_exploit

Porting BlueKeep PoC from @Ekultek to actual exploits

Working shell code. However you have to generate your own and customize it to suit your need. This is not some off-the-shelf exploit which you can just grab and check out.

The shell code in this example is generated using the Magic Unicorn from trusted sec. https://github.com/trustedsec/unicorn

Assumption (I might misinterpret the result)

The response should look like the following:

[ + ] <socket.socket fd=3, family=AddressFamily.AF_INET, type=SocketKind.SOCK_STREAM, proto=0, laddr=('192.168.137.1', 64251), raddr=('192.168.137.201', 3389)>

laddr (aka lhost in metasploit) is the IP that it will connect back to. However, as said, this is just an example. You should write your own shell code in order to suit your setup.

**Note: Please use Python 3

About

Porting BlueKeep PoC from @Ekultek to actual exploits

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%