Please read the through theissues (both closed and open beofre posting stuff like "It doesn't work", "Nothing happened after I ran the script", or "Error (without being specific), please help me".
Welcome to Join our Discord Server
! Please note that this is not yet an exploit but rather an attempt to port existing PoCs to actual exploits.
============================================================================
============================================================================
I am just like anyone of you who enjoy solving complex problems and learn from the process. I am here just to share my progress while at the same time get some opinions from the public. Sharing is caring :)
============================================================================
I have got working shell codes when standalone. However you have to generate your own and customize it to suit your need. This is not some off-the-shelf exploits which you can just grab and check out.
Furthermore, the methods of delivery is also important to make sure your codes will execute on the remote machine.
So far we still aren't able to succesfully to pop a shell and achieved RCE; however, intensive research is being done in order understand the inner working of the vulnerability.
Most of the scanners and PoCs out there work by only analyzing the responses from the targeted hosts and determine if the hosts are vulnerable or not. (As all of you should know, patched and unpatched versions return different reponses, as well as O.S that are not affected). They don't actually "exploit" the targeted hosts. In order to achieve RCE, first we should try to trigger the vulnerability by sending specially crafted packets (refer to RDP MSDN for protocol specifications). After the vulnerabiliy is triggered, the second step is to analyze the crashed or memory dumps to figure out how our codes can fit in. It's not as simple as most of us think it is.
Some useful resources:
You can use the Magic Unicorn from @trustedsec for generating shell codes. https://github.com/trustedsec/unicorn
**Note: Please use Python 3
The RDP client initiates the connection when the user provides the name of the remote desktop to connect to. The RDP client initiates a connection to the RD Session Host by sending an X.224 Connection Request protocol data unit (PDU)
The RD Session Host responds with an X.224 Connection Confirm PDU.
The RDP client sends a Multipoint Communication Service (MCS) Connect Initial PDU with GCC Conference Create Request. --> Vulnerability is related to this request.
The RD Session Host responds with an MCS Connect Response PDU with GCC Conference Create Response.
The RDP client sends an MCS Erect Domain Request PDU.
The RDP client sends an MCS Attach User Request PDU.
The RD Session Host responds with an MCS Attach User Confirm PDU.
The RDP client sends multiple (in this case six) MCS Channel Join Request PDUs.
The RD Session Host sends multiple (in this case six) MCS Channel Join Confirm PDUs.
The RDP client sends a Security Exchange PDU.
The RDP client sends a Client Info PDU.
The RD Session Host sends a License Error PDU-Valid Client.
The RD Session Host sends a Demand Active PDU.
The RDP client responds with a Confirm Active PDU.
The RDP client sends a Synchronize PDU.
The RDP client sends a Control PDU-Cooperate.
The RDP client sends a Control PDU-Request Control.
The RDP client sends zero or more Persistent Key List PDUs. In this case, zero PDUs are sent.
The RDP client sends a Font List PDU.
The RD Session Host sends a Synchronize PDU.
The RD Session Host sends a Control PDU-Cooperate.
The RD Session Host sends a Control PDU-Granted Control.
The RD Session Host sends a Font Map PDU..