Le PAD pour proposer une amélioration à cette page : https://pad.zenk-security.com/p/merci
[Base de donnée d'Exploits et Vulnerabilités ]
offline :
-
-
-
→ apt update && apt -y install exploitdb
→ searchsploit -u #update
→ searchsploit “linux Kernel”–exclude=”(PoC)|/dos/” #Example
→ searchsploit apache mod_ssl #Other example
→ searchsploit -m 7618 #Paste the exploit in current directory
→ searchsploit -p 7618[.c] #Show complete path
→ searchsploit -x 7618[.c] #Open vi to inspect the exploit
→ searchsploit –nmap file.xml #Search vulns inside an nmap xml result
→ searchsploit openssh 3 –color| grep -i 'openssh 3.' #This example filter the result
→ nmap –min-rate 200 -p- 10.10.10.93 -oX resultat.xml
→ searchsploit -x –nmap resultat.xml
Windows Exploit Suggester
-
→ pip install xlrd –upgrade
→ apt install python3-xlrd
→ ./windows-exploit-suggester.py –update
→ python windows-exploit-suggester.py –database 2020-07-27-mssb.xls –systeminfo sysinfo.txt
Windows Exploit Suggester - Next Generation (WES-NG)
-
→ python wes.py –update
→ python wes.py sysinfoTarget.txt
List only vulnerabilities with exploits, excluding
IE, Edge and Flash
→ wes.py systeminfo.txt –exploits-only –hide “Internet Explorer” Edge Flash
→ wes.py systeminfo.txt -e –hide “Internet Explorer” Edge Flash
Only show vulnerabilities of a certain impact
→ wes.py systeminfo.txt - -impact “Remote Code Execution”
→ wes.py systeminfo.txt -i “Remote Code Execution”
→ wes.py systeminfo.txt -i “Elevation of Privilege”
Only show vulnerabilities of a certain severity
→ wes.py systeminfo.txt –severity critical important
→ wes.py systeminfo.txt -s critical
online :
Finding more information regarding the exploit
trouver_des_exploits_publique.txt · Dernière modification: 2024/05/17 14:53 par M0N5T3R