0x001 Win detected
https://github.com/robertdavidgraham/rdpscan C: \ the Users \ K8team \ Desktop \ rdpscan-Master \ VS10 \ Release directories 2019/06/02 02:11 <the DIR>. 2019/06/02 02:11 < the DIR> .. 2019/06/02 01:55 2,582,016 libcrypto-1_1.dll 2019/06/02 01:57 619,520 for libssl-1_1.dll 2019/06/02 02:04 172,032 rdpscan.exe . 3 files 3,373,568 bytes 2 2,462,433,280 bytes available directory C: \ the Users \ K8team \ Desktop \ rdpscan-Master \ VS10 \ Release> rdpscan 192.168.1.101-192.168.1.105 192.168.1.101 - VULNERABLE - CVE-2019-0708 192.168.1.102 - VULNERABLE - CVE -2019-0708 C: \ the Users \ K8team \ Desktop \ rdpscan-Master \ VS10 \ Release> rdpscan 192.168.1.101-192.168.1.105 192.168.1.102 - SAFE - CredSSP / NLA required 192.168.1.101 - VULNERABLE - CVE-2019-0708
0x002 Linux detected
https://github.com/SugiB3o/Check-vuln-CVE-2019-0708 root@kali:~/Desktop# ./rdesktop 192.168.1.101:3389 ERROR: Failed to open keymap en-us [+] Registering MS_T120 channel. Failed to negotiate protocol, retrying with plain RDP. [+] Sending MS_T120 check packet (size: 0x20 - offset: 0x8) [+] Sending MS_T120 check packet (size: 0x10 - offset: 0x4) [!] Target is VULNERABLE!!!
0x003 Cscan batch testing
The rdpscan.exe and dll files are copied to Cscan directory, create Cscan.ini file, as follows
[Cscan] exe=rdpscan.exe arg=$ip$
Batch scanning
Cscan.exe 192.168.1.101/24 (C single sweep segment, a plurality of section B or section C Cscan refer to instructions)
Local use GUI (only .net 2.0, please according to their own choice or the target computer .net version Cscan version)
0x004 Bin Download
Win compiler may be more trouble here compiled finished
Win7 x86 are the exe, of course, the system 64 can also be used
Kali 2019 x64 executable files, other versions of the compiler itself