rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
33.79k stars 13.9k forks source link

Exploit failed: NameError undefined local variable or method `rdp_connect' #12292

Closed wzxmt closed 5 years ago

wzxmt commented 5 years ago

[] Started reverse TCP handler on 192.168.31.:4444 [+] 192.168.31.:3389 - The target is vulnerable. [-] 192.168.31.:3389 - Exploit failed: NameError undefined local variable or method `rdp_connect' for # Did you mean? disconnect [*] Exploit completed, but no session was created.

bcoles commented 5 years ago

To test the BlueKeep exploit, ensure you've copied all four .rb files from this PR to the appropriate Metasploit directories, then restart msfconsole.

This PR includes changes to the core RDP library in Metasploit for this exploit.

fix76 commented 5 years ago

i have a same error, update dont help

bcoles commented 5 years ago

i have a same error, update dont help

An update will not help. The module is not in Metasploit.

To test the BlueKeep exploit, ensure you've copied all four .rb files from this PR to the appropriate Metasploit directories, then restart msfconsole.

This PR includes changes to the core RDP library in Metasploit for this exploit.

fix76 commented 5 years ago

all files is newest, error still display :(

bcoles commented 5 years ago

all files is newest, error still display :(

To test the BlueKeep exploit, ensure you've copied all four .rb files from this PR to the appropriate Metasploit directories, then restart msfconsole.

This PR includes changes to the core RDP library in Metasploit for this exploit.

zablah commented 5 years ago

same error with all file setup lib/msf/core/exploit/rdp.rb modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb modules/auxiliary/scanner/rdp/rdp_scanner.rb modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb

bcoles commented 5 years ago

This issue is resolved. Locking.