• XSS.stack #1 – первый литературный журнал от юзеров форума

Search BlueKeep for windows

Пожалуйста, обратите внимание, что пользователь заблокирован
Пожалуйста, обратите внимание, что пользователь заблокирован
It's in metasploit...
Install msf: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html

Код:
       =[ metasploit v6.3.30-dev-                         ]
+ -- --=[ 2340 exploits - 1220 auxiliary - 413 post       ]
+ -- --=[ 1387 payloads - 46 encoders - 11 nops           ]
+ -- --=[ 9 evasion                                       ]

Metasploit tip: You can pivot connections over sessions
started with the ssh_login modules
Metasploit Documentation: https://docs.metasploit.com/

msf6 > search bluekeep

Matching Modules
================

   #  Name                                            Disclosure Date  Rank    Check  Description
   -  ----                                            ---------------  ----    -----  -----------
   0  auxiliary/scanner/rdp/cve_2019_0708_bluekeep    2019-05-14       normal  Yes    CVE-2019-0708 BlueKeep Microsoft Remote Desktop RCE Check
   1  exploit/windows/rdp/cve_2019_0708_bluekeep_rce  2019-05-14       manual  Yes    CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free


Interact with a module by name or index. For example info 1, use 1 or use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
 
Пожалуйста, обратите внимание, что пользователь заблокирован
It's in metasploit...
Install msf: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html

Код:
       =[ metasploit v6.3.30-dev-                         ]
+ -- --=[ 2340 exploits - 1220 auxiliary - 413 post       ]
+ -- --=[ 1387 payloads - 46 encoders - 11 nops           ]
+ -- --=[ 9 evasion                                       ]

Metasploit tip: You can pivot connections over sessions
started with the ssh_login modules
Metasploit Documentation: https://docs.metasploit.com/

msf6 > search bluekeep

Matching Modules
================

   #  Name                                            Disclosure Date  Rank    Check  Description
   -  ----                                            ---------------  ----    -----  -----------
   0  auxiliary/scanner/rdp/cve_2019_0708_bluekeep    2019-05-14       normal  Yes    CVE-2019-0708 BlueKeep Microsoft Remote Desktop RCE Check
   1  exploit/windows/rdp/cve_2019_0708_bluekeep_rce  2019-05-14       manual  Yes    CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free


Interact with a module by name or index. For example info 1, use 1 or use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
Need version for windows. (BlackKeep by PlayBit)

1692016317282.png
 
Hi!
Need link to BlueKeep for windows(bksexe)
https://github.com/nccgroup/BKScan.git This is a checker to scan if the system is vulnerable to bluekeep

This is how to build, but you have more instruction on the github

$ git clone https://github.com/nccgroup/BKScan.git
$ cd BKScan
$ sudo docker build -t bkscan .
[...]
Successfully built f7666aeb3259
Successfully tagged bkscan:latest

And how to run it, again the github have more detailed instruction

$ git clone https://github.com/nccgroup/BKScan.git
$ cd BKScan
$ sudo docker build -t bkscan .
[...]
Successfully built f7666aeb3259
Successfully tagged bkscan:latest

https://github.com/TinToSer/bluekeep-exploit.git here is an exploit, work with metasploit

https://www.rapid7.com/blog/post/20...it-exploit-module-for-bluekeep-cve-2019-0708/ more info for this exploit on rapid7

I hope this help you, have a nice day
 
Пожалуйста, обратите внимание, что пользователь заблокирован
https://github.com/nccgroup/BKScan.git This is a checker to scan if the system is vulnerable to bluekeep

This is how to build, but you have more instruction on the github

$ git clone https://github.com/nccgroup/BKScan.git
$ cd BKScan
$ sudo docker build -t bkscan .
[...]
Successfully built f7666aeb3259
Successfully tagged bkscan:latest

And how to run it, again the github have more detailed instruction

$ git clone https://github.com/nccgroup/BKScan.git
$ cd BKScan
$ sudo docker build -t bkscan .
[...]
Successfully built f7666aeb3259
Successfully tagged bkscan:latest

https://github.com/TinToSer/bluekeep-exploit.git here is an exploit, work with metasploit

https://www.rapid7.com/blog/post/20...it-exploit-module-for-bluekeep-cve-2019-0708/ more info for this exploit on rapid7

I hope this help you, have a nice day
Need version for windows. (BlackKeep by PlayBit)
 
It's in metasploit...
Install msf: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html

Код:
       =[ metasploit v6.3.30-dev-                         ]
+ -- --=[ 2340 exploits - 1220 auxiliary - 413 post       ]
+ -- --=[ 1387 payloads - 46 encoders - 11 nops           ]
+ -- --=[ 9 evasion                                       ]

Metasploit tip: You can pivot connections over sessions
started with the ssh_login modules
Metasploit Documentation: https://docs.metasploit.com/

msf6 > search bluekeep

Matching Modules
================

   #  Name                                            Disclosure Date  Rank    Check  Description
   -  ----                                            ---------------  ----    -----  -----------
   0  auxiliary/scanner/rdp/cve_2019_0708_bluekeep    2019-05-14       normal  Yes    CVE-2019-0708 BlueKeep Microsoft Remote Desktop RCE Check
   1  exploit/windows/rdp/cve_2019_0708_bluekeep_rce  2019-05-14       manual  Yes    CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free


Interact with a module by name or index. For example info 1, use 1 or use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
that bluekeep exploit is old. has anyone developed any newer version of that?
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх