Dirty, but it works
This commit is contained in:
g0tmi1k 2016-12-08 20:35:27 +00:00
parent 55bbc4f153
commit b94b787e2d
2 changed files with 8 additions and 7 deletions

View file

@ -56,12 +56,13 @@ root@kali:~# searchsploit afd windows local
Exploit Title | Path
| (/usr/share/exploitdb/platforms)
--------------------------------------------------------------------------------- ----------------------------------
Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) | ./windows/local/6757.txt
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c
Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) (MS08-066) | ./windows/local/6757.txt
Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py
Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) | ./windows/local/21844.rb
Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) (Metasploit) | ./windows/local/21844.rb
Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py
Microsoft Windows 7 (x64) - 'afd.sys' Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py
Microsoft Windows (x86) - 'afd.sys' Privilege Escalation (MS11-046) | ./windows/local/40564.c
--------------------------------------------------------------------------------- ----------------------------------
root@kali:~#
root@kali:~# searchsploit -p 39446
@ -70,6 +71,7 @@ Exploit: Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS
Path: /usr/share/exploitdb/platforms/win_x86/local/39446.py
Copied EDB-ID 39446's path to the clipboard.
root@kali:~#
```

View file

@ -1,7 +1,7 @@
#!/bin/bash
# Name: SearchSploit - Exploit-DB's CLI search tool
# Version: 3.7.1 (Release date: 2016-11-07)
# Written by: Offensive Security, Unix-Ninja & g0tmi1k
# Version: 3.7.2 (Release date: 2016-12-08)
# Written by: Offensive Security, Unix-Ninja, and g0tmi1k
# Homepage: https://github.com/offensive-security/exploit-database
#
## NOTE:
@ -350,7 +350,6 @@ function buildterms()
}
## Check for empty args
if [[ $# -eq 0 ]]; then
usage >&2
@ -517,8 +516,8 @@ if [[ "${GETPATH}" -eq 1 ]]; then
fi
if [[ "${MIRROR}" -eq 1 ]]; then
echo "Copied to '$(pwd)/'"
cp -i "${location}" "$(pwd)/"
echo "Copied to '$(pwd)/'"
echo -e "\n"
fi
else
@ -628,7 +627,7 @@ elif [[ "${EDBID}" -eq 1 ]]; then
## Print JSON format (full options) ("--json")?
elif [[ "${JSON}" -eq 1 ]]; then
OUTPUT="$( eval ${SEARCH} \
| awk -F "\"*,\"*" '{ printf "\r\t\t'{'\"Exploit\":\"%s\",\"Path\":\"'${gitpath}/'%s\",\"EDB-ID\":%s},\n", $3, $2, $1 }' \
| awk -F "\"*,\"*" '{ printf "\r\t\t'{'\"Exploit\":\"%s,\"Path\":\"'${gitpath}/'%s\",\"EDB-ID\":%s},\n", $3, $2, $1 }' \
| sed '$ s/,$//g' )"
## Default view
else