top of page

Exploitation

After reconnaissance and scanning, we will proceed to gain unauthorized access to the target machine via exploiting the RDP vulnerability using the Metasploit tool in Kali Linux virtual machine environment.

metasploit.png
kali.jpg

Firstly, enter the"msfconsole" command to start the Metasploit framework.

metasploit.jpg

Secondly, use the"search blue keep" command is executed to find available modules pertaining to bluekeep exploit. 

3.jpg

We will be using module number "1" as it contains the actual bluekeep exploit and scanner while option "0" only contains the scanner.

Screenshot (750).png

We would proceed to define the settings for our exploit & payload modules. We would be using meterpreter/reverse_tcp as the payload.

Screenshot (751).png

1. Set payload to reverse_tcp

2. Set RHOSTS to target machine IP Address  (Windows Server 2008)

3. Set LHOSTS to Kali Linux IP Address

4. Set LPORT to 4444 (Kali Linux)

Thirdly, execute the "show options" command to double-check if the configuration settings made in the previous sections are right.

 

In addition, RDP_CLIENT_IP is to be set to the same subnet as the IP address of the device that you run the exploit from as this is a client to server attack. The configuration would thus allow for an RDP connection and allow the exploitation to work.

(Optional) Change GROOMSIZE parameter to 50 relates to the size of data chunks sent to the target machine. The GROOMSIZE is set to a lower value than the default to prevent crashes when working with virtual machines.  

Screenshot (752).png

As shown from the above screenshot, the exploit target is not yet specified.  Thus, execute the "show targets" command to see which targets are available for selection. 

Screenshot (753).png

As there is more than one Windows 2008 server available for selection, we look for the VMware version in use and select the specific target. For our case, we will select the target number "5".

Lastly, after all, the necessary configuration has been made, run the "exploit" command to gain a meterpreter session into the target machine. 

Screenshot (754).png

Exploit was successful as meterpreter session 1 has opened.

Best viewed in Chrome browser settings

©️ 2020 School of InfoComm Technology, Ngee Ann Polytechnic. All rights reserved.

bottom of page