cve-2019-0708漏洞复现
利用cve-2019-0708造成靶机蓝屏
1.利用msf 扫描模块确定是否存在漏洞
2.利用msf攻击模块进行攻击
注意设置set target 1
准备工作:
(1)下载 Reference中的攻击套件放置文件到msf的相应文件夹
下载地址:https://github.com/rapid7/metasploit-framework/
(2)替换相应的msf
cve_2019_0708_bluekeep_rce.rb 位于metasploit-framework-master\modules\exploits\windows\rdp
cve_2019_0708_bluekeep_rce.rb 添加到/usr/share/metasploit-framework/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
需要自己创建文件夹rdp
建立文件cve_2019_0708_bluekeep_rce.rb,再cp到对应得位置
rdp.rb位于metasploit-framework-master\lib\msf\core\exploit\remote
rdp.rb 替换 /usr/share/metasploit-framework/lib/msf/core/exploit/rdp.rb
rdp_scanner.rb位于metasploit-framework-master\modules\auxiliary\scanner\rdp
rdp_scanner.rb 替换 /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/rdp_scanner.rb
cve_2019_0708_bluekeep.rb位于metasploit-framework-master\modules\auxiliary\scanner\rdp
cve_2019_0708_bluekeep.rb 替换 /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
(3)更新msf
apt update
apt install metasploit-framework
(4)启动msf,加载文件
(5)进行攻击