Where is SearchSploit stored?

找到 SearchSploit 搜尋到的漏洞,但要看code時位置在哪呢?

我們已經找到了我們正在尋找的漏洞利用,有多種方法可以快速訪問它。
通過使用-p,我們可以獲得更多關於漏洞利用的信息,並將漏洞利用的完整路徑複製到剪貼板:

kali@kali:~$ searchsploit 39446
--------------------------------------------------------------------------------------- ---------------------------------
 Exploit Title                                                                         |  Path
--------------------------------------------------------------------------------------- ---------------------------------
Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | windows_x86/local/39446.py
--------------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Result
kali@kali:~$
kali@kali:~$ searchsploit -p 39446

  Exploit: Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)
      URL: https://www.exploit-db.com/exploits/39446/
     Path: /usr/share/exploitdb/exploits/windows_x86/local/39446.py
File Type: Python script, ASCII text executable, with CRLF line terminators

Copied EDB-ID #39446's path to the clipboard.
kali@kali:~$
kali@kali:~$ /usr/share/exploitdb/exploits/windows_x86/local/39446.py

以我使用的系統來說就存放在 /opt/searchsploit之中

發佈留言

發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *

eighteen + twenty =

Back To Top
error: Content is protected !!