Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
Description
Mass exploit for CVE-2019-0708
Readme
# Wincrash
    I'm not responsible for what you use this to accomplish and should 
    only be used for education purposes. CVE-2019-0708 - when an unauthenticated
    attacker connects to the target system using RDP and sends specially crafted
    requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
    This exploit only crashes devices without executing code
    
    
# Screenshots

![alt text](https://raw.githubusercontent.com/NotEth1calHack3r/Wincrash/master/Screenshot_20191002_133002.png)
![alt text](https://raw.githubusercontent.com/NotEth1calHack3r/Wincrash/master/Screenshot_20191002_132051.png)


# Install:
```
$ apt-get install python3 python3-pip
$ cd Wincrash
$ pip3 install -r requirements.txt
```

# Contacts
Telegram: @eth_hacker0x18
File Snapshot

[4.0K] /data/pocs/00162a7c52360ad26e46ccd2556b0c568f02afb9 ├── [ 780] README.md ├── [ 26] requirements.txt ├── [239K] Screenshot_20191002_132051.png ├── [106K] Screenshot_20191002_133002.png └── [ 18K] wincrash.py 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →