Exploiting the RDP BlueKeep vulnerability using Metasploit

RDP BlueKeep vulnerability