rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.15k stars 13.97k forks source link

BlueKeep -> Exploit failed: Errno::EPIPE Broken pipe #12296

Closed majid-d closed 5 years ago

majid-d commented 5 years ago

When I type "run" I got this :

[*] Started reverse TCP handler on 192.168.1.58:4444 
[*] XX.XX.XX.XX:3389   - Detected RDP on XX.XX.XX.XX:3389   (Windows version: 6.1.7601) (Requires NLA: No)
[+] XX.XX.XX.XX:3389   - The target is vulnerable.
[*] XX.XX.XX.XX:3389 - Using CHUNK grooming strategy. Size 250MB, target address 0xfffffa8013200000, Channel count 1.
[*] XX.XX.XX.XX:3389 - Surfing channels ...
[*] XX.XX.XX.XX:3389 - Lobbing eggs ...
[-] XX.XX.XX.XX:3389 - Exploit failed: Errno::EPIPE Broken pipe
[*] Exploit completed, but no session was created.

Target is a physical machine Metasploit Version -> 5.0.47 I am using Mac OS Mojave 10.14.6

Am I missing something here ! Thanks in advance.

Plus: I have followed this by @bcoles as well

To test the BlueKeep exploit, ensure you've copied all four .rb files from this PR to the appropriate Metasploit directories, then restart msfconsole.

This PR includes changes to the core RDP library in Metasploit for this exploit.

lib/msf/core/exploit/rdp.rb modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb modules/auxiliary/scanner/rdp/rdp_scanner.rb modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb

majid-d commented 5 years ago

i guess "Errno::EPIPE Broken pipe" has something to do with the exploit code ! am i right ?

jozxing commented 5 years ago

我猜“Errno :: EPIPE Broken pipe”与漏洞利用代码有关 !我对吗 ?

the same error, Have you solved it?

majid-d commented 5 years ago

Not yet

ResidualLaugh commented 5 years ago

Using MSF on mac, the target is physical machine (win7 Sp1 x64), and the same error occurs.

ResidualLaugh commented 5 years ago

Same versions Metasploit Framework: 5.0.47-dev-e2815a997b93f6fae32c607dc409ba0feea1f90a Console : 5.0.47-dev-e2815a997b93f6fae32c607dc409ba0feea1f90a mojava 10.14.6

jozxing commented 5 years ago

Same versions Metasploit Framework: 5.0.47-dev-e2815a997b93f6fae32c607dc409ba0feea1f90a Console : 5.0.47-dev-e2815a997b93f6fae32c607dc409ba0feea1f90a mojava 10.14.6

all versions the same,do you have solved it?

ResidualLaugh commented 5 years ago

相同版本 Metasploit 框架:5.0.47-dev-e2815a997b93f6fae32c607dc409ba0feea1f90a 控制台:5.0.47-dev-e2815a997b93f6fae32c607dc409ba0feea1f90a mojava 10.14.6

所有版本都一样,你有没有解决它?

I have no idea.

majid-d commented 5 years ago

Same versions Metasploit Framework: 5.0.47-dev-e2815a997b93f6fae32c607dc409ba0feea1f90a Console : 5.0.47-dev-e2815a997b93f6fae32c607dc409ba0feea1f90a mojava 10.14.6

all versions the same,do you have solved it?

The issue has been labeled as "Bug", i think we have to wait and see what will happen

busterb commented 5 years ago

Filing bugs on PRs that haven't landed yet really just means now the developers have to do double work responding to and closing them down in the mean time. Check out: https://twitter.com/zeekzack/status/1173971987674411008