CVE-2019-0708-BlueKeep漏洞復現

環境git

攻擊機:Kali Linuxgithub

IP:192.168.0.108shell

 

 

靶機:Windows Sever 7 SP1 旗艦版windows

IP:192.168.0.109api

 

 

Exploit:安全

https://github.com/rapid7/metasploit-framework/pull/12283?from=timeline&isappinstalled=0網絡

攻擊步驟app

(1)下載Exploit:tcp

https://github.com/rapid7/metasploit-framework/pull/12283?from=timeline&isappinstalled=0測試

 

 

(2)導入攻擊組件,從新加載Msfconsole metasploit-模塊。

 

 

(3)設置Payload攻擊載荷

 

 

(4)選擇Exploit

 

 

(5)設置攻擊、IP設置靶機IP、攻擊類型,攻擊類型根據不一樣的靶機環境選擇,但因爲exp的穩定,測試中也能夠使用其餘類型進行攻擊測試。

 

 

 

 

 

 

 

(6)檢測是否存在漏洞

 

 

(7)發動攻擊,exploit攻擊成功,得到靶機shell。

 

 

 

 

(8)Exploit不太穩定,攻擊測試常常產生藍屏。測試10次成功3次左右。測試版本爲windows sp1 旗艦版,若採用windows 2008 R2進行測試,則須要修改註冊表[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\rdp-tcp\fDisableCam]值修改成0(系統默認爲1)

 

 

(9)修復方法,CVE-2019-0708漏洞修復補丁以及安全建議

臨時修復方案:計算機右鍵屬性-遠程設置-僅容許運行使用網絡基自己份驗證的遠程桌面的計算機鏈接(更安全)

漏洞補丁地址:

1.Windows Server 2008 漏洞補丁系列下載地址

Windows Server 2008 32位系統:

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499149-x86_832cf179b302b861c83f2a92acc5e2a152405377.msu

Windows Server 2008 x64位系統:

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499149-x64_9236b098f7cea864f7638e7d4b77aa8f81f70fd6.msu

Windows Server 2008 R2 Itanium系統:

http://download.windowsupdate.com/c/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-ia64_fabc8e54caa0d31a5abe8a0b347ab4a77aa98c36.msu

Windows Server 2008 R2 x64系統:

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu

Windows Server 2008 Itanium:

http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499180-ia64_805e448d48ab8b1401377ab9845f39e1cae836d4.msu

2.Windows Server 2003 漏洞補丁系列下載地址

Windows Server 2003 32位系統:

http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x86-custom-chs_4892823f525d9d532ed3ae36fc440338d2b46a72.exe

Windows Server 2003 64位系統:

http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x64-custom-chs_f2f949a9a764ff93ea13095a0aca1fc507320d3c.exe

3. Windows XP 漏洞補丁系列下載地址

Windows XP SP3 32位系統:

http://download.windowsupdate.com/c/csa/csa/secu/2019/04/windowsxp-kb4500331-x86-custom-chs_718543e86e06b08b568826ac13c05f967392238c.exe

Windows XP SP2 64位系統:

http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x64-custom-enu_e2fd240c402134839cfa22227b11a5ec80ddafcf.exe

Windows XP SP3 for XPe:

http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsxp-kb4500331-x86-embedded-custom-chs_96da48aaa9d9bcfe6cd820f239db2fe96500bfae.exe

相關文章
相關標籤/搜索