Closed wzxmt closed 5 years ago
To test the BlueKeep exploit, ensure you've copied all four .rb
files from this PR to the appropriate Metasploit directories, then restart msfconsole
.
This PR includes changes to the core RDP library in Metasploit for this exploit.
i have a same error, update dont help
i have a same error, update dont help
An update will not help. The module is not in Metasploit.
To test the BlueKeep exploit, ensure you've copied all four .rb
files from this PR to the appropriate Metasploit directories, then restart msfconsole
.
This PR includes changes to the core RDP library in Metasploit for this exploit.
all files is newest, error still display :(
all files is newest, error still display :(
To test the BlueKeep exploit, ensure you've copied all four .rb
files from this PR to the appropriate Metasploit directories, then restart msfconsole
.
This PR includes changes to the core RDP library in Metasploit for this exploit.
same error with all file setup lib/msf/core/exploit/rdp.rb modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb modules/auxiliary/scanner/rdp/rdp_scanner.rb modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
This issue is resolved. Locking.
[] Started reverse TCP handler on 192.168.31.:4444 [+] 192.168.31.:3389 - The target is vulnerable. [-] 192.168.31.:3389 - Exploit failed: NameError undefined local variable or method `rdp_connect' for #
Did you mean? disconnect
[*] Exploit completed, but no session was created.