parent
55bbc4f153
commit
b94b787e2d
2 changed files with 8 additions and 7 deletions
|
@ -56,12 +56,13 @@ root@kali:~# searchsploit afd windows local
|
||||||
Exploit Title | Path
|
Exploit Title | Path
|
||||||
| (/usr/share/exploitdb/platforms)
|
| (/usr/share/exploitdb/platforms)
|
||||||
--------------------------------------------------------------------------------- ----------------------------------
|
--------------------------------------------------------------------------------- ----------------------------------
|
||||||
Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) | ./windows/local/6757.txt
|
|
||||||
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c
|
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c
|
||||||
|
Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) (MS08-066) | ./windows/local/6757.txt
|
||||||
Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py
|
Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py
|
||||||
Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) | ./windows/local/21844.rb
|
Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) (Metasploit) | ./windows/local/21844.rb
|
||||||
Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py
|
Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py
|
||||||
Microsoft Windows 7 (x64) - 'afd.sys' Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py
|
Microsoft Windows 7 (x64) - 'afd.sys' Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py
|
||||||
|
Microsoft Windows (x86) - 'afd.sys' Privilege Escalation (MS11-046) | ./windows/local/40564.c
|
||||||
--------------------------------------------------------------------------------- ----------------------------------
|
--------------------------------------------------------------------------------- ----------------------------------
|
||||||
root@kali:~#
|
root@kali:~#
|
||||||
root@kali:~# searchsploit -p 39446
|
root@kali:~# searchsploit -p 39446
|
||||||
|
@ -70,6 +71,7 @@ Exploit: Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS
|
||||||
Path: /usr/share/exploitdb/platforms/win_x86/local/39446.py
|
Path: /usr/share/exploitdb/platforms/win_x86/local/39446.py
|
||||||
|
|
||||||
Copied EDB-ID 39446's path to the clipboard.
|
Copied EDB-ID 39446's path to the clipboard.
|
||||||
|
|
||||||
root@kali:~#
|
root@kali:~#
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
# Name: SearchSploit - Exploit-DB's CLI search tool
|
# Name: SearchSploit - Exploit-DB's CLI search tool
|
||||||
# Version: 3.7.1 (Release date: 2016-11-07)
|
# Version: 3.7.2 (Release date: 2016-12-08)
|
||||||
# Written by: Offensive Security, Unix-Ninja & g0tmi1k
|
# Written by: Offensive Security, Unix-Ninja, and g0tmi1k
|
||||||
# Homepage: https://github.com/offensive-security/exploit-database
|
# Homepage: https://github.com/offensive-security/exploit-database
|
||||||
#
|
#
|
||||||
## NOTE:
|
## NOTE:
|
||||||
|
@ -350,7 +350,6 @@ function buildterms()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Check for empty args
|
## Check for empty args
|
||||||
if [[ $# -eq 0 ]]; then
|
if [[ $# -eq 0 ]]; then
|
||||||
usage >&2
|
usage >&2
|
||||||
|
@ -517,8 +516,8 @@ if [[ "${GETPATH}" -eq 1 ]]; then
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ "${MIRROR}" -eq 1 ]]; then
|
if [[ "${MIRROR}" -eq 1 ]]; then
|
||||||
echo "Copied to '$(pwd)/'"
|
|
||||||
cp -i "${location}" "$(pwd)/"
|
cp -i "${location}" "$(pwd)/"
|
||||||
|
echo "Copied to '$(pwd)/'"
|
||||||
echo -e "\n"
|
echo -e "\n"
|
||||||
fi
|
fi
|
||||||
else
|
else
|
||||||
|
@ -628,7 +627,7 @@ elif [[ "${EDBID}" -eq 1 ]]; then
|
||||||
## Print JSON format (full options) ("--json")?
|
## Print JSON format (full options) ("--json")?
|
||||||
elif [[ "${JSON}" -eq 1 ]]; then
|
elif [[ "${JSON}" -eq 1 ]]; then
|
||||||
OUTPUT="$( eval ${SEARCH} \
|
OUTPUT="$( eval ${SEARCH} \
|
||||||
| awk -F "\"*,\"*" '{ printf "\r\t\t'{'\"Exploit\":\"%s\",\"Path\":\"'${gitpath}/'%s\",\"EDB-ID\":%s},\n", $3, $2, $1 }' \
|
| awk -F "\"*,\"*" '{ printf "\r\t\t'{'\"Exploit\":\"%s,\"Path\":\"'${gitpath}/'%s\",\"EDB-ID\":%s},\n", $3, $2, $1 }' \
|
||||||
| sed '$ s/,$//g' )"
|
| sed '$ s/,$//g' )"
|
||||||
## Default view
|
## Default view
|
||||||
else
|
else
|
||||||
|
|
Loading…
Add table
Reference in a new issue