hello friends,
I followed this
" To test the BlueKeep exploit, ensure you’ve copied all four .rb files from this PR to the appropriate Metasploit directories, then restart msfconsole.
This PR includes changes to the core RDP library in Metasploit for this exploit.
I would recommend you to search for Bluekeep exploit on exploit-db > download it > run it and then perform tests on vulnerable machine. If this isn’t successful then go for Metasploit.
Thanks for the reply,
It seems to me that these 2 exploits are meant to cause denial of service attack,
Metasploit version is for gaining shell access,
i am wondering how can i fix this " Exploit failed: Errno::EPIPE Broken pipe " issue
Hi mjd!
You should check your code from bluekeep, so You can see the issue point where it has this “Broken pipe” written. You do know its binary-crash right?
On my code there is no “Broken pipe”, so keep looking it from Yours.
I had similar issue with web-kits. I was stuck with overflow. But I checked the timeline and went through code. Then added delay to where it waits connection to DB, so “too much information at time” didnt crash the connection. Even on DB, there is this less is better rule.
This seems to be “update” issue. Metasploit (and armitage) have same thing going on. “New released” and next to be linux distros do not let You use some modules as “illegal”.
You may have some older version of linux?
As said, Armitage works on older release, but not with updated && upgraded version.
Also some depends are not updated (apt-get --fix-missing or apt-get -f do not work on them).
So… get any older version of linux and try that for msf
Hey there
in any version of Metasploit we have to replace these files with the files that have already existed :
1.cve_2019_0708_bluekeep_rce.rb
2.rdp_scanner.rb
3.cve_2019_0708_bluekeep.rb
4.rdp.rb
so I don’t think version or update is the issue here,