Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
Description
Checker and exploit for Bluekeep CVE-2019-0708 vulnerability
Readme
# Description

This script checks multiple IP addresses for the BlueKeep vulnerability (CVE-2019-0708), which is a critical Remote Desktop Protocol (RDP) vulnerability found in older versions of Windows operating systems. The vulnerability allows attackers to remotely execute code on a target machine without any user interaction, potentially leading to full system compromise.

# Instructions

Install Python 3.x if you haven't already (https://www.python.org/downloads/).

Clone the repository with:

  git clone https://github.com/davidfortytwo/bluekeep.git

Open a terminal or command prompt.

Navigate to the directory where the script is located using the cd command.

Run the script by providing a list of target IP addresses as space-separated arguments. For example:

  python3 bluekeep-checker.py -t 192.168.1.1 192.168.1.2 192.168.1.3
  
The script will display the results for each IP address, indicating whether it is likely vulnerable to BlueKeep, patched, or not up/accessible.

Please note that scanning IP addresses without proper authorization may be illegal in some jurisdictions. Use this script responsibly and only for authorized purposes.  
File Snapshot

[4.0K] /data/pocs/8c8f48b97311391fa5b022f30547251beb2a1ac8 ├── [1.3K] bluekeep-checker.py ├── [ 34K] LICENSE └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.