From 2cffa6f07cb0c65a9686ff1f494a84c413f52172 Mon Sep 17 00:00:00 2001 From: g0tmi1k Date: Thu, 30 Apr 2020 17:13:29 +0100 Subject: [PATCH] README update for new output --- README.md | 31 ++++++++++++++++--------------- 1 file changed, 16 insertions(+), 15 deletions(-) diff --git a/README.md b/README.md index dd31f6c27..080afc502 100644 --- a/README.md +++ b/README.md @@ -39,8 +39,10 @@ kali@kali:~$ searchsploit -h searchsploit afd windows local searchsploit -t oracle windows searchsploit -p 39446 - searchsploit linux kernel 3.2 -s --exclude="(PoC)|/dos/" + searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/" + searchsploit -s Apache Struts 2.0.0 searchsploit linux reverse password + searchsploit -j 55555 | json_pp For more examples, see the manual: https://www.exploit-db.com/searchsploit @@ -91,31 +93,30 @@ kali@kali:~$ searchsploit -h * When using '--nmap', adding '-v' (verbose), it will search for even more combinations * When updating or displaying help, search terms will be ignored -root@kali:~# -root@kali:~# searchsploit afd windows local +kali@kali:~$ +kali@kali:~$ searchsploit afd windows local ---------------------------------------------------------------------------------------- ----------------------------------- Exploit Title | Path - | (/usr/share/exploitdb/) ---------------------------------------------------------------------------------------- ----------------------------------- -Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046) | exploits/windows_x86/local/40564.c -Microsoft Windows - 'AfdJoinLeaf' Local Privilege Escalation (MS11-080) (Metasploit) | exploits/windows/local/21844.rb -Microsoft Windows - 'afd.sys' Local Kernel (PoC) (MS11-046) | exploits/windows/dos/18755.c -Microsoft Windows 7 (x64) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | exploits/windows_x86-64/local/39525.py -Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | exploits/windows_x86/local/39446.py -Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | exploits/windows/dos/17133.c -Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (K-plugin) (MS08-066) | exploits/windows/local/6757.txt -Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (MS11-080) | exploits/windows/local/18176.py +Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046) | windows_x86/local/40564.c +Microsoft Windows - 'afd.sys' Local Kernel (PoC) (MS11-046) | windows/dos/18755.c +Microsoft Windows - 'AfdJoinLeaf' Local Privilege Escalation (MS11-080) (Metasploit) | windows/local/21844.rb +Microsoft Windows 7 (x64) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | windows_x86-64/local/39525.py +Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | windows_x86/local/39446.py +Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | windows/dos/17133.c +Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (K-plugin) (MS08-066) | windows/local/6757.txt +Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (MS11-080) | windows/local/18176.py ---------------------------------------------------------------------------------------- ----------------------------------- Shellcodes: No Result -root@kali:~# -root@kali:~# searchsploit -p 39446 +kali@kali:~$ +kali@kali:~$ searchsploit -p 39446 Exploit: Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) URL: https://www.exploit-db.com/exploits/39446 Path: /usr/share/exploitdb/exploits/windows_x86/local/39446.py File Type: Python script, ASCII text executable, with CRLF line terminators Copied EDB-ID #39446's path to the clipboard. -root@kali:~# +kali@kali:~$ ``` - - -