Researching Potential Vulnerabilities
Once we have good notes enumerating http/https, smb and ssh we can research potential vulnerabilities.
Google
Look after public exploits that could work on Google (rapid7.com, github, exploit-db.com, etc.)
searchsploit
ex: searchsploit Samba 2
searchsploit -x {exploit}
#To examine the exploit
Last updated