hacktricks/generic-methodologies-and-resources/search-exploits.md

94 lines
5 KiB
Markdown
Raw Normal View History

# Search Exploits
2022-04-28 16:01:33 +00:00
{% hint style="success" %}
Impara e pratica AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Impara e pratica GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
<details>
2022-04-28 16:01:33 +00:00
<summary>Supporta HackTricks</summary>
2023-12-30 20:49:23 +00:00
* Controlla i [**piani di abbonamento**](https://github.com/sponsors/carlospolop)!
* **Unisciti al** 💬 [**gruppo Discord**](https://discord.gg/hRep4RUj7f) o al [**gruppo telegram**](https://t.me/peass) o **seguici** su **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Condividi trucchi di hacking inviando PR ai** [**HackTricks**](https://github.com/carlospolop/hacktricks) e [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos su github.
2022-04-28 16:01:33 +00:00
</details>
{% endhint %}
2022-04-28 16:01:33 +00:00
<figure><img src="../.gitbook/assets/image (48).png" alt=""><figcaption></figcaption></figure>
2023-09-03 15:41:02 +00:00
\
Usa [**Trickest**](https://trickest.com/?utm_source=hacktricks&utm_medium=text&utm_campaign=ppc&utm_content=search-exploits) per costruire e **automatizzare flussi di lavoro** facilmente, alimentati dagli **strumenti comunitari più avanzati** al mondo.\
Ottieni accesso oggi:
2023-09-03 15:41:02 +00:00
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=search-exploits" %}
2023-09-03 15:41:02 +00:00
2022-05-06 12:33:22 +00:00
### Browser
Cerca sempre in "google" o altri: **\<service\_name> \[version] exploit**
Dovresti anche provare la **ricerca exploit shodan** da [https://exploits.shodan.io/](https://exploits.shodan.io).
2022-05-06 12:33:22 +00:00
### Searchsploit
2024-02-10 13:03:23 +00:00
Utile per cercare exploit per servizi in **exploitdb dalla console.**
```bash
#Searchsploit tricks
searchsploit "linux Kernel" #Example
searchsploit apache mod_ssl #Other example
searchsploit -m 7618 #Paste the exploit in current directory
searchsploit -p 7618[.c] #Show complete path
searchsploit -x 7618[.c] #Open vi to inspect the exploit
searchsploit --nmap file.xml #Search vulns inside an nmap xml result
```
2022-05-06 12:33:22 +00:00
### Pompem
[https://github.com/rfunix/Pompem](https://github.com/rfunix/Pompem) è un altro strumento per cercare exploit
2022-05-06 12:33:22 +00:00
### MSF-Search
```bash
msf> search platform:windows port:135 target:XP type:exploit
```
2022-05-06 12:33:22 +00:00
### PacketStorm
Se non viene trovato nulla, prova a cercare la tecnologia utilizzata all'interno di [https://packetstormsecurity.com/](https://packetstormsecurity.com)
2022-05-06 12:33:22 +00:00
### Vulners
Puoi anche cercare nel database vulners: [https://vulners.com/](https://vulners.com)
2022-05-06 12:33:22 +00:00
### Sploitus
2024-02-10 13:03:23 +00:00
Questo cerca exploit in altri database: [https://sploitus.com/](https://sploitus.com)
2022-04-28 16:01:33 +00:00
### Sploitify
Elenco curato di exploit simile a GTFOBins con filtri per tipo di vulnerabilità (Local Privilege Escalation, Remote Code execution, ecc.), tipo di servizio (Web, SMB, SSH, RDP, ecc.), OS e laboratori pratici (link a macchine dove puoi giocare con gli exploit): [https://sploitify.haxx.it](https://sploitify.haxx.it)
### search_vulns
search_vulns ti consente di cercare vulnerabilità e exploit noti: [**https://search-vulns.com/**](https://search-vulns.com/). Utilizza varie fonti di dati come il NVD, l'Exploit-DB, PoC-in-GitHub, il database delle Advisory di Sicurezza di GitHub e endoflife.date.
<figure><img src="../.gitbook/assets/image (48).png" alt=""><figcaption></figcaption></figure>
2023-09-03 15:41:02 +00:00
\
Usa [**Trickest**](https://trickest.com/?utm_source=hacktricks&utm_medium=text&utm_campaign=ppc&utm_content=search-exploits) per costruire e **automatizzare flussi di lavoro** facilmente alimentati dagli **strumenti comunitari più avanzati** del mondo.\
Accedi oggi:
2023-09-03 15:41:02 +00:00
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=search-exploits" %}
2023-09-03 15:41:02 +00:00
{% hint style="success" %}
Impara e pratica AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Impara e pratica GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
<details>
2022-04-28 16:01:33 +00:00
<summary>Supporta HackTricks</summary>
2023-12-30 20:49:23 +00:00
* Controlla i [**piani di abbonamento**](https://github.com/sponsors/carlospolop)!
* **Unisciti al** 💬 [**gruppo Discord**](https://discord.gg/hRep4RUj7f) o al [**gruppo telegram**](https://t.me/peass) o **seguici** su **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Condividi trucchi di hacking inviando PR ai** [**HackTricks**](https://github.com/carlospolop/hacktricks) e [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos di github.
2022-04-28 16:01:33 +00:00
</details>
{% endhint %}