找到 SearchSploit 搜尋到的漏洞,但要看code時位置在哪呢?
我們已經找到了我們正在尋找的漏洞利用,有多種方法可以快速訪問它。
通過使用-p
,我們可以獲得更多關於漏洞利用的信息,並將漏洞利用的完整路徑複製到剪貼板:
kali@kali:~$ searchsploit 39446
--------------------------------------------------------------------------------------- ---------------------------------
Exploit Title | Path
--------------------------------------------------------------------------------------- ---------------------------------
Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | windows_x86/local/39446.py
--------------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Result
kali@kali:~$
kali@kali:~$ searchsploit -p 39446
Exploit: Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)
URL: https://www.exploit-db.com/exploits/39446/
Path: /usr/share/exploitdb/exploits/windows_x86/local/39446.py
File Type: Python script, ASCII text executable, with CRLF line terminators
Copied EDB-ID #39446's path to the clipboard.
kali@kali:~$
kali@kali:~$ /usr/share/exploitdb/exploits/windows_x86/local/39446.py
以我使用的系統來說就存放在 /opt/searchsploit之中