Đã Đóng

Building an automated script (any languages) to personalize the behaviour of: "CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free

READ EACH STEP CAREFULLY (It seems a lot of work, but it's simple, and don't require a lot of time), in detail, before providing your willingness to work on the project!

I had to include my request in a separate text file, because it was too long for the field provided by the "[login to view URL]" platform. I also included the script through which the exploiting currently takes place, in the module already configured in Metasploit, and working, and the external module to check the presence of the vulnerability (Remote Command Execution checker). (Archive named "RCE Checker- External [login to view URL]").

Note: The module "[login to view URL]" (Attachment) contained in Metasploit already contains a vulnerability checker. If you prefer, you could just rely on that, ignoring the external module. (External module: convenient, but optional).

Once you have read all my requests carefully, please contact me to give me your opinion, or ask me for clarification.

THEY ARE ACCEPTED ONLY USERS WITH HIGH SKILLS; able to do all the job required, with maximum precision.

If you have any doubts, please contact me, and we will see together your compatibility with the project.

PLEASE, DOWNLOAD ANY FILE ATTACHED. Thanks in advance.

Best regards.

ML.

References:

1. Exploit Module: [login to view URL] (Screenshot of the module in execution, with the included options, attached at the bottom of this page).

2. Page related the checker: [login to view URL] (Same Metasploit file, as the previous).

3. Useful tool: [login to view URL]

4. Official github of the External Module, with all the information explained in detail: [login to view URL] (Archive named "RCE Checker- External [login to view URL]")

Kĩ năng: Python, Ruby, Phát triển phần mềm, Coding, Growth Hacking

Xem nhiều hơn: script use printer windows server, clone desktop windows remote desktop, kernel windows driver keylogger, microsoft rdp rce cve-2019-0708 exploit, bluekeep vulnerability (cve-2019-0708), metasploit bluekeep checker, 2019 cve 0708 exploit, cve-2019-0708 detection, rapid7 cve-2019-0708, cve-2019-0708 rce, cve-2019-0708 windows xp, windows remote process execution, change windows remote script, use webservice windows mobile, linux windows remote collaboration skype cliente vnc, freelancer windows remote, application use camera windows mobile phone, install use flvtool2 windows, clone windows remote desktop, use backtrack windows crack wep

Về Bên Thuê:
( 2 nhận xét ) Massarosa, Italy

ID dự án: #25449054

4 freelancer chào giá trung bình$294 cho công việc này

arvindkushwah9

Dear, I have 7+ years experienced in Web Development. When I read this job I feel very excited to be a part of your project and share my great experience in software development. Specialties: Ruby on Rails, RESTful Thêm

$275 USD trong 7 ngày
(44 Nhận xét)
6.4
Lightcanon

Hello, I am a computer engineer and cyber security enthusiast . I have wrote and automated many tools in Python/C++ utilizing win32 api to explore windows internals. Also, I know about Blue Keep vuln. Driven by my pen Thêm

$300 USD trong 7 ngày
(46 Nhận xét)
5.1
writiqueproject

MATLAB I have extensive experience in the domains of Neural Network, Python, Matlab, Natural Language Processing, Asterisks PBX, Linux, Image Recognition & Artificial Intelligence, Recommender Systems, Machine learnin Thêm

$300 USD trong 2 ngày
(8 Nhận xét)
4.1
NoiosoTech

seriously? this is just automation lol... this looks fairly easy. I also used to work as a security pentester so I have experience with metasploit of course. here is my portfolio: [login to view URL] eith Thêm

$300 USD trong 7 ngày
(0 Nhận xét)
0.0