Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
Description
CVE-2019-0708, A tool which mass hunts for bluekeep vulnerability for exploitation.
Readme
# Bluekeep-Hunter
CVE-2019-0708

This uses metasploit module in order to scan and check if CVE-2019-0708 exists or not.
The objective of this is to check and confirm if computers in the organisations are actually vulnerable or not rather than using a simple checking of version and other parameters not being met. This checker solves that problem. It will hunt and exploit, just get the list of IPs from the IT manager. Making work of Security Departments being reduced 10x. Till date most common attacks against AD is EternalBlue.

Install and Usage:

To install clone this repository.

cd Bluekeep-Hunter

chmod +x bluekeephunter.sh

./bluekeephunter.sh targets.txt

Additional: To view usage ./blukeephunter.sh -h
 
 **DEMONSTRATION:**
 
 ![FINALDEMOBLUE](https://user-images.githubusercontent.com/48627542/190843346-8a6e5340-e9d6-403c-ace0-337890f4ec05.gif)
File Snapshot

[4.0K] /data/pocs/fc40f369a7b3c1bac7653ee4fa6d69e7b7c019f3 ├── [2.4K] bluekeephunter.sh ├── [1.0K] LICENSE └── [ 862] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.