Closed hexagon-sigma closed 5 years ago
It looks like you only downloaded the exploit module. You need these four files included in the PR for the module to properly run:
https://twitter.com/TheColonial/status/1173789138417418246?s=19
On Tue, 17 Sep 2019, 23:16 Shelby Pace, notifications@github.com wrote:
It looks like you only downloaded the exploit module. You need these four files included in the PR for the module to properly run:
- lib/msf/core/exploit/rdp.rb
- modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
- modules/auxiliary/scanner/rdp/rdp_scanner.rb
- modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/rapid7/metasploit-framework/issues/12337?email_source=notifications&email_token=AAAHBYB5GEN4TJRNRPXOGVDQKDKBVA5CNFSM4IXNCEC2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOD64POZI#issuecomment-532215653, or mute the thread https://github.com/notifications/unsubscribe-auth/AAAHBYBZEWRAOWERP6QTR43QKDKBVANCNFSM4IXNCECQ .
I am trying to connect a vulnerable Windows 7 installation from AWS Kali Linux.It shows The target is vulnerable but not going through. [] Started reverse TCP handler on 172.31.23.143:4444 [+] Public IP:3389 - The target is vulnerable. [-] Public Ip:3389 - Exploit failed: NameError undefined local variable or method `rdp_connect' for #
Did you mean? disconnect
[ ] Exploit completed, but no session was created.
Basic options: Name Current Setting Required Description
RDP_CLIENT_IP 192.168.0.100 yes The client IPv4 address to report during connect RDP_CLIENT_NAME ethdev no The client computer name to report during connect, UNSET = random RDP_DOMAIN no The client domain name to report during connect RDP_USER no The username to report during connect, UNSET = random RHOSTS PUBLIC IP yes The target address range or CIDR identifier RPORT 3389 yes The target port (TCP)