BlueKeep – Exploit Windows (RDP Vulnerability) Remotely
port 3389 vulnerability Initial Intrusion: Hackers exploit exposed RDP servers, often using brute-force attacks on weak credentials or purchasing access on darknet marketplaces. For example, using default RDP port 3389, attackers can identify vulnerable systems with tools like Nmap:- nmap -sV --script=rdp-vuln-ms12-020 -p 3389 .port 3389 not listening
BlueKeep (officially classified as CVE-2019-0708) is a vulnerability that allows attackers to execute any code they want on a computer if they send a specially crafted request to the right port (usually 3389).3389 port forwarding
Port is IANA registered for Microsoft WBT Server, used for Windows Remote Desktop and Remote Assistance connections (RDP - Remote Desktop Protocol). Also used by Windows Terminal Server. See also: MS Security Bulletin [MS02-051] and [MS01-040]. This port is vulnerable to Denial of Service Attack Against Windows NT Terminal Server.