0x001 Win下檢測
https://github.com/robertdavidgraham/rdpscan C:\Users\K8team\Desktop\rdpscan-master\vs10\Release 的目錄 2019/06/02 02:11 <DIR> . 2019/06/02 02:11 <DIR> .. 2019/06/02 01:55 2,582,016 libcrypto-1_1.dll 2019/06/02 01:57 619,520 libssl-1_1.dll 2019/06/02 02:04 172,032 rdpscan.exe 3 個文件 3,373,568 字節 2 個目錄 2,462,433,280 可用字節 C:\Users\K8team\Desktop\rdpscan-master\vs10\Release>rdpscan 192.168.1.101-192.168.1.105 192.168.1.101 - VULNERABLE - CVE-2019-0708 192.168.1.102 - VULNERABLE - CVE-2019-0708 C:\Users\K8team\Desktop\rdpscan-master\vs10\Release>rdpscan 192.168.1.101-192.168.1.105 192.168.1.102 - SAFE - CredSSP/NLA required 192.168.1.101 - VULNERABLE - CVE-2019-0708
0x002 Linux下檢測
https://github.com/SugiB3o/Check-vuln-CVE-2019-0708 root@kali:~/Desktop# ./rdesktop 192.168.1.101:3389 ERROR: Failed to open keymap en-us [+] Registering MS_T120 channel. Failed to negotiate protocol, retrying with plain RDP. [+] Sending MS_T120 check packet (size: 0x20 - offset: 0x8) [+] Sending MS_T120 check packet (size: 0x10 - offset: 0x4) [!] Target is VULNERABLE!!!
0x003 Cscan批量檢測
將rdpscan.exe以及dll文件拷貝至Cscan目錄,新建Cscan.ini文件,內容如下
[Cscan] exe=rdpscan.exe arg=$ip$
批量掃描
Cscan.exe 192.168.1.101/24 (掃單個C段,多個C段或B段請參考Cscan說明)
本地可使用GUI(僅.net 2.0,請根據自身或目標電腦.net版本選擇Cscan版本)
0x004 Bin下載
Win下編譯可能比較麻煩這里提供編譯好的成品
分別是Win7 x86的exe,當然64系統下也可以用
Kali 2019 x64的可執行文件,其它版本自行編譯