rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
33.79k stars 13.9k forks source link

NameError undefined local variable or method `rdp_connect' #12337

Closed hexagon-sigma closed 5 years ago

hexagon-sigma commented 5 years ago

I am trying to connect a vulnerable Windows 7 installation from AWS Kali Linux.It shows The target is vulnerable but not going through. [] Started reverse TCP handler on 172.31.23.143:4444 [+] Public IP:3389 - The target is vulnerable. [-] Public Ip:3389 - Exploit failed: NameError undefined local variable or method `rdp_connect' for # Did you mean? disconnect [] Exploit completed, but no session was created.

Basic options: Name Current Setting Required Description


RDP_CLIENT_IP 192.168.0.100 yes The client IPv4 address to report during connect RDP_CLIENT_NAME ethdev no The client computer name to report during connect, UNSET = random RDP_DOMAIN no The client domain name to report during connect RDP_USER no The username to report during connect, UNSET = random RHOSTS PUBLIC IP yes The target address range or CIDR identifier RPORT 3389 yes The target port (TCP)

space-r7 commented 5 years ago

It looks like you only downloaded the exploit module. You need these four files included in the PR for the module to properly run:

OJ commented 5 years ago

https://twitter.com/TheColonial/status/1173789138417418246?s=19

On Tue, 17 Sep 2019, 23:16 Shelby Pace, notifications@github.com wrote:

It looks like you only downloaded the exploit module. You need these four files included in the PR for the module to properly run:

  • lib/msf/core/exploit/rdp.rb
  • modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
  • modules/auxiliary/scanner/rdp/rdp_scanner.rb
  • modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/metasploit-framework/issues/12337?email_source=notifications&email_token=AAAHBYB5GEN4TJRNRPXOGVDQKDKBVA5CNFSM4IXNCEC2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOD64POZI#issuecomment-532215653, or mute the thread https://github.com/notifications/unsubscribe-auth/AAAHBYBZEWRAOWERP6QTR43QKDKBVANCNFSM4IXNCECQ .