2020-07-15 15:43:14 +00:00
|
|
|
# Search Exploits
|
|
|
|
|
|
|
|
### Browser
|
|
|
|
|
2021-10-18 11:21:18 +00:00
|
|
|
Always search in "google" or others: **\<service_name> \[version] exploit**
|
2020-07-15 15:43:14 +00:00
|
|
|
|
2021-10-18 11:21:18 +00:00
|
|
|
You should also try the **shodan** **exploit search **from [https://exploits.shodan.io/](https://exploits.shodan.io).
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
|
|
### Searchsploit
|
|
|
|
|
|
|
|
Useful to search exploits for services in **exploitdb from the console.**
|
|
|
|
|
|
|
|
```bash
|
|
|
|
#Searchsploit tricks
|
|
|
|
searchsploit "linux Kernel" #Example
|
|
|
|
searchsploit apache mod_ssl #Other example
|
|
|
|
searchsploit -m 7618 #Paste the exploit in current directory
|
|
|
|
searchsploit -p 7618[.c] #Show complete path
|
|
|
|
searchsploit -x 7618[.c] #Open vi to inspect the exploit
|
|
|
|
searchsploit --nmap file.xml #Search vulns inside an nmap xml result
|
|
|
|
```
|
|
|
|
|
|
|
|
### MSF-Search
|
|
|
|
|
|
|
|
```bash
|
|
|
|
msf> search platform:windows port:135 target:XP type:exploit
|
|
|
|
```
|
|
|
|
|
|
|
|
### PacketStorm
|
|
|
|
|
2021-10-18 11:21:18 +00:00
|
|
|
If nothing is found, try to search the used technology inside [https://packetstormsecurity.com/](https://packetstormsecurity.com)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
|
|
### Vulners
|
|
|
|
|
2021-10-18 11:21:18 +00:00
|
|
|
You can also search in vulners database: [https://vulners.com/](https://vulners.com)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
|
|
### Sploitus
|
|
|
|
|
2021-10-18 11:21:18 +00:00
|
|
|
This search exploits in other databases: [https://sploitus.com/](https://sploitus.com)
|