From 855b4f329f6894e4cd64480065fb8535c4c1ef32 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E4=B8=9C=E6=96=B9=E6=9C=89=E9=B1=BC=E5=90=8D=E4=B8=BA?= =?UTF-8?q?=E5=92=B8?= Date: Sun, 15 Sep 2019 14:46:38 +0800 Subject: [PATCH] =?UTF-8?q?Update=20CVE-2019-0708-msf=E5=BF=AB=E9=80=9F?= =?UTF-8?q?=E6=90=AD=E5=BB=BA.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- CVE-2019-0708-msf快速搭建.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/CVE-2019-0708-msf快速搭建.md b/CVE-2019-0708-msf快速搭建.md index 5d8d92e..612d79a 100644 --- a/CVE-2019-0708-msf快速搭建.md +++ b/CVE-2019-0708-msf快速搭建.md @@ -23,3 +23,5 @@ gem pristine bundler > 仅在Debian测试过 + +> 参考: https://pentest-tools.com/blog/bluekeep-exploit-metasploit/