Closed ku4eto closed 4 years ago
What happens when you set VERBOSE true
?
sf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > set verbose true
verbose => true
msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > exploit
[*] 188.254.215.84:3389 - Verifying RDP protocol...
[*] 188.254.215.84:3389 - Attempting to connect using TLS security
[*] 188.254.215.84:3389 - Verifying RDP protocol...
[*] 188.254.215.84:3389 - Attempting to connect using TLS security
[*] 188.254.215.84:3389 - Detected RDP on <obfuscated>:3389 (Windows version: 6.1.7601) (Requires NLA: No)
[*] 188.254.215.84:3389 - Sending erect domain request
[*] 188.254.215.84:3389 - Sending client info PDU
[*] 188.254.215.84:3389 - Received License packet (34 bytes)
[*] 188.254.215.84:3389 - Got license packet type 0xff (LICENSE_ERROR_ALERT)
[*] 188.254.215.84:3389 - License error/alert code 0x7 (LICENSE_ISSUED)
[*] 188.254.215.84:3389 - Waiting for Server Demand packet
[*] 188.254.215.84:3389 - Received Server Demand packet
[*] 188.254.215.84:3389 - Sending client confirm active PDU
[*] 188.254.215.84:3389 - Sending client synchronize PDU
[*] 188.254.215.84:3389 - Sending client control cooperate PDU
[*] 188.254.215.84:3389 - Sending client control request control PDU
[*] 188.254.215.84:3389 - Sending client input sychronize PDU
[*] 188.254.215.84:3389 - Sending client font list PDU
[*] 188.254.215.84:3389 - Sending patch check payloads
[-] 188.254.215.84:3389 - Error communicating RDP protocol.
[*] 188.254.215.84:3389 - Cannot reliably check exploitability.
[*] 188.254.215.84:3389 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
Oh, there we go.
Steps to reproduce
Run the scanner
How'd you do it?
set RHOSTS <TARGET>
remmina
prompts for Username and Passwordrun
orexploit
Expected behavior
Expecting a message on whats the status, whether the target is vulnerable or not
Current behavior
No message about vulnerabiltiy is displayed
According to the README.md, it should provide any of the 3 messages listed there.
System stuff
Metasploit version
Get this with the
version
command in msfconsole (orgit log -1 --pretty=oneline
for a source install).I installed Metasploit with:
OS
What OS are you running Metasploit on?
Linux Mint 19