关联漏洞
标题:
Microsoft Remote Desktop Services 资源管理错误漏洞
(CVE-2019-0708)
描述:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
描述
Checker and exploit for Bluekeep CVE-2019-0708 vulnerability
介绍
# Description
This script checks multiple IP addresses for the BlueKeep vulnerability (CVE-2019-0708), which is a critical Remote Desktop Protocol (RDP) vulnerability found in older versions of Windows operating systems. The vulnerability allows attackers to remotely execute code on a target machine without any user interaction, potentially leading to full system compromise.
# Instructions
Install Python 3.x if you haven't already (https://www.python.org/downloads/).
Clone the repository with:
git clone https://github.com/davidfortytwo/bluekeep.git
Open a terminal or command prompt.
Navigate to the directory where the script is located using the cd command.
Run the script by providing a list of target IP addresses as space-separated arguments. For example:
python3 bluekeep-checker.py -t 192.168.1.1 192.168.1.2 192.168.1.3
The script will display the results for each IP address, indicating whether it is likely vulnerable to BlueKeep, patched, or not up/accessible.
Please note that scanning IP addresses without proper authorization may be illegal in some jurisdictions. Use this script responsibly and only for authorized purposes.
文件快照
[4.0K] /data/pocs/8c8f48b97311391fa5b022f30547251beb2a1ac8
├── [1.3K] bluekeep-checker.py
├── [ 34K] LICENSE
└── [1.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。