[POC] Microsoft's 3389 remote vulnerability CVE-2019-0708 batch testing tool

0x001 Win detected

https://github.com/robertdavidgraham/rdpscan 

C: \ the Users \ K8team \ Desktop \ rdpscan-Master \ VS10 \ Release directories 

2019/06/02 02:11 <the DIR>. 
2019/06/02 02:11 < the DIR> .. 
2019/06/02 01:55 2,582,016 libcrypto-1_1.dll 
2019/06/02 01:57 619,520 for libssl-1_1.dll 
2019/06/02 02:04 172,032 rdpscan.exe 
               . 3 files 3,373,568 bytes 
               2 2,462,433,280 bytes available directory 

C: \ the Users \ K8team \ Desktop \ rdpscan-Master \ VS10 \ Release> rdpscan 192.168.1.101-192.168.1.105 
192.168.1.101 - VULNERABLE - CVE-2019-0708 
192.168.1.102 - VULNERABLE - CVE -2019-0708 
 
C: \ the Users \ K8team \ Desktop \ rdpscan-Master \ VS10 \ Release> rdpscan 192.168.1.101-192.168.1.105
192.168.1.102 - SAFE - CredSSP / NLA required 
192.168.1.101 - VULNERABLE - CVE-2019-0708

0x002 Linux detected

https://github.com/SugiB3o/Check-vuln-CVE-2019-0708

root@kali:~/Desktop# ./rdesktop 192.168.1.101:3389
ERROR: Failed to open keymap en-us
[+] Registering MS_T120 channel.
Failed to negotiate protocol, retrying with plain RDP.
[+] Sending MS_T120 check packet (size: 0x20 - offset: 0x8)
[+] Sending MS_T120 check packet (size: 0x10 - offset: 0x4)
[!] Target is VULNERABLE!!!

 

0x003 Cscan batch testing

The rdpscan.exe and dll files are copied to Cscan directory, create Cscan.ini file, as follows

[Cscan]
exe=rdpscan.exe
arg=$ip$

 Batch scanning

Cscan.exe 192.168.1.101/24 (C single sweep segment, a plurality of section B or section C Cscan refer to instructions)

Local use GUI (only .net 2.0, please according to their own choice or the target computer .net version Cscan version)

0x004 Bin Download

Win compiler may be more trouble here compiled finished

Win7 x86 are the exe, of course, the system 64 can also be used

Kali 2019 x64 executable files, other versions of the compiler itself

POC:  https://github.com/k8gege/CVE-2019-0708

Cscan: https://www.cnblogs.com/k8gege/p/10519321.html

Guess you like

Origin www.cnblogs.com/k8gege/p/10962383.html