Researching Potential Vulnerabilities

Once we have good notes enumerating http/https, smb and ssh we can research potential vulnerabilities.

  1. Google

Look after public exploits that could work on Google (rapid7.com, github, exploit-db.com, etc.)

  1. searchsploit

ex: searchsploit Samba 2

searchsploit -x {exploit} #To examine the exploit

Last updated