Metasploit module for CVE-2019-0708 (BlueKeep) - https://github.com/rapid7/metasploit-framework/tree/5a0119b04309c8e61b44763ac08811cd3ecbbf8d/modules/exploits/windows/rdp# CVE-2019-0708 (Bluekeep)
Metasploit module for CVE-2019-0708 (BlueKeep)
Pulled from https://github.com/rapid7/metasploit-framework/tree/5a0119b04309c8e61b44763ac08811cd3ecbbf8d/modules/exploits/windows/rdp
and fixed
## File copy instructions
1. Make a folder named 'rdp' in /usr/share/metasploit-framework/modules/exploits/windows/
2. Copy the files 'cve_2019_0708_bluekeep_rce.rb' in the folder
3. Replace the files in following folders:
- rdp.rb --> /usr/share/metasploit-framework/lib/msf/core/exploit/
- rdp_scanner.rb --> /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp
- cve_2019_0708_bluekeep.rb --> /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp
## Runtime
``use exploit/windows/rdp/cve_2019_0708_bluekeep_rce``
## Use for research only
I did not write this code nor do I endorse any illegal activity using this code - this is for security research only.
[4.0K] /data/pocs/2f7c028ed3e854bd57a695accd264bedf295c552
├── [ 39K] cve_2019_0708_bluekeep_rce.rb
├── [ 48K] rdp_bluekeep.py
├── [ 46K] rdp.rb
├── [3.0K] rdp_scanner.rb
└── [ 909] README.md
0 directories, 5 files