Comments (14)
Yes. There is a reason it's named magic. As the saying goes "Programming is the closest humanity has come to writing spells, and by extension, programmers are as close as we've come to wizards."
It won't work with any set of shell code, you have to play around with several different combinations.
It took me 40hrs non-sleep. Just FYI.
from bluekeep_cve-2019-0708_poc_to_exploit.
my payload spawns a reverse tcp shell which can be used with metasploit. You can play around with yours and see if it works. BlueKeep is not stable, as well as its spouses in the "Blue" family.
from bluekeep_cve-2019-0708_poc_to_exploit.
show me your code. there must be a bracket mismatch
from bluekeep_cve-2019-0708_poc_to_exploit.
no change in your code. just run your poc.py on my win2008r2 rdp.
from bluekeep_cve-2019-0708_poc_to_exploit.
which python version are you using
from bluekeep_cve-2019-0708_poc_to_exploit.
win2008r2 may be not vulnerability
from bluekeep_cve-2019-0708_poc_to_exploit.
python3
from bluekeep_cve-2019-0708_poc_to_exploit.
which windows versions affected?
from bluekeep_cve-2019-0708_poc_to_exploit.
Windows 2003
Windows XP
Windows Vista
Windows 7
Windows Server 2008
Windows Server 2008 R2
but it depends from host to host
from bluekeep_cve-2019-0708_poc_to_exploit.
what your payload do? can I replace with my payload? just hexencoded string?
from bluekeep_cve-2019-0708_poc_to_exploit.
for custom payload, I should replace magic = ("") with my hexencoded windows command wants to run after exploit. right?
from bluekeep_cve-2019-0708_poc_to_exploit.
@algo7 which version you have test?
i tried win2k8 and win7sp2 it doesn't work.
i also change the shell code to hexed 'calc',but nothing happen
from bluekeep_cve-2019-0708_poc_to_exploit.
@algo7 which version you have test?
i tried win2k8 and win7sp2 it doesn't work.
i also change the shell code to hexed 'calc',but nothing happen
hello
from bluekeep_cve-2019-0708_poc_to_exploit.
@Chinalover @xiaozhu1337 I've tested against all versions. Some of them work at some times and vice versa. It's not a stable exploit. Plus, not all the auto-generated shellcode will fit. That's why I keep stressing on customization.
from bluekeep_cve-2019-0708_poc_to_exploit.
Related Issues (20)
- Commenting out tls.sendall(bytes(magic, "utf-8")), gives same 'result' HOT 23
- What after successful run? HOT 5
- error HOT 1
- can u show more info about this exp? HOT 1
- Working Shellcode HOT 5
- how to modify the content of method 'client_active_confirmation_pdu' HOT 1
- client logs HOT 2
- Impacket issue HOT 2
- 报错 “远程主机强迫关闭了一个现有连接” error ”The remote host forced an existing connection to close" HOT 2
- wtf is that HOT 1
- Shelcode generation seems useless HOT 17
- Party Foul
- Some help with shell HOT 2
- Some random guy tried to exploit our peaceful community here on github HOT 2
- why the local port is random HOT 3
- Why don't you just add "bytes = os.system"? 👎 HOT 1
- why your shellcode not involved ASLR HOT 2
- i just use the tool to generate a shellcode ,but nothing happend HOT 9
- unable to connect: (10054, 'WSAECONNRESET') HOT 1
- unable to connect: str() takes at most 1 argument (2 given) HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from bluekeep_cve-2019-0708_poc_to_exploit.