POC详情: 8c8f48b97311391fa5b022f30547251beb2a1ac8

来源
关联漏洞
标题: Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
描述:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
描述
Checker and exploit for Bluekeep CVE-2019-0708 vulnerability
介绍
# Description

This script checks multiple IP addresses for the BlueKeep vulnerability (CVE-2019-0708), which is a critical Remote Desktop Protocol (RDP) vulnerability found in older versions of Windows operating systems. The vulnerability allows attackers to remotely execute code on a target machine without any user interaction, potentially leading to full system compromise.

# Instructions

Install Python 3.x if you haven't already (https://www.python.org/downloads/).

Clone the repository with:

  git clone https://github.com/davidfortytwo/bluekeep.git

Open a terminal or command prompt.

Navigate to the directory where the script is located using the cd command.

Run the script by providing a list of target IP addresses as space-separated arguments. For example:

  python3 bluekeep-checker.py -t 192.168.1.1 192.168.1.2 192.168.1.3
  
The script will display the results for each IP address, indicating whether it is likely vulnerable to BlueKeep, patched, or not up/accessible.

Please note that scanning IP addresses without proper authorization may be illegal in some jurisdictions. Use this script responsibly and only for authorized purposes.  
文件快照

[4.0K] /data/pocs/8c8f48b97311391fa5b022f30547251beb2a1ac8 ├── [1.3K] bluekeep-checker.py ├── [ 34K] LICENSE └── [1.1K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。