ϳԹ

Threat Intelligence
September 23, 2019
2019-09-23
2025-05-19
19:17

A tame BlueKeep: Get hands-on with the exploit in our free lab

No items found.
Contributors
Share

If you're a security professional, you will no doubt have heard about the BlueKeep vulnerability (CVE-2019-0708), which affects some older versions of Microsoft Windows.

The heightened interest in BlueKeep is largely because it attacks Windows’ Remote Desktop Protocol (RDP), which connects one computer to another. A threat capable of connecting to other computers over a network could spread extremely quickly, making it a significant risk. It’s this network awareness that threats like BadRabbit and WannaCry used to replicate from machine to machine with such speed and efficiency. Since the UK National Cyber Security Centre first discovered BlueKeep in May 2019, Microsoft has been strongly advising its users that the patch should be deployed as soon as possible.

On 6 September 2019, Metasploit released an initial public exploit module which builds on proof-of-concept code from , who also worked on Metasploit’s BlueKeep scanner module as well as the scanner and exploit modules for EternalBlue.

There are, of course, a ton of blogs out there that explain how to use this Metasploit module, but here at ϳԹ we know there’s no better way to learn than by doing. That’s why we’ve made our BlueKeep Exploit lab available to everyone for free. and click on ‘Emerging Threats’. You’ll also find a useful lab on how to search and use exploits within Metasploit.

Trusted by top
companies worldwide

Customer
Insights

The speed at which Immersive produces technical content is hugely impressive, and this turnaround has helped get our teams ahead of the curve, giving them hands-on experience with serious vulnerabilities, in a secure environment, as soon as they emerge.
TJ Campana
Head of Global Cybersecurity
Operations, HSBC
Realistic simulation of current threats is the only way to test and improve response readiness, and to ensure that the impact of a real attack is minimized. Immersive’s innovative platform, combined with Kroll’s extensive experience, provides the closest thing to replication of a real incident — all within a safe virtual environment.
Paul Jackson
Regional Managing Director,
APAC Cyber Risk, Kroll

Ready to Get Started?
Get a Live Demo.

Simply complete the form to schedule time with an expert that works best for your calendar.