Skip to content

Commit d91434b

Browse files
committed
win-exp-suggester
1 parent 1fa2d22 commit d91434b

File tree

2 files changed

+67
-0
lines changed

2 files changed

+67
-0
lines changed

win-exp-suggester/2017-06-14-mssb.xls

2 MB
Binary file not shown.

win-exp-suggester/help.md

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
## 使用方法
2+
3+
1.首先需要更新漏洞数据库
4+
```
5+
$ ./windows-exploit-suggester.py --update
6+
[*] initiating...
7+
[*] successfully requested base url
8+
[*] scraped ms download url
9+
[+] writing to file 2017-06-14-mssb.xls
10+
[*] done
11+
```
12+
13+
2.然后安装程序依赖:[python-xlrd](https://pypi.python.org/pypi/xlrd)
14+
```
15+
ubuntu@ubuntu:~/xlrd-0.9.4/xlrd-0.9.4$ sudo python setup.py install
16+
[sudo] password for ubuntu:
17+
running install
18+
running build
19+
running build_py
20+
running build_scripts
21+
running install_lib
22+
creating /usr/local/lib/python2.7/dist-packages/xlrd
23+
copying build/lib.linux-x86_64-2.7/xlrd/compdoc.py -> /usr/local/lib/python2.7/dist-packages/xlrd
24+
......
25+
```
26+
27+
3.接着在目标机器中执行systeminfo,并将其输出到文件 win7sp1-systeminfo.txt 中,然而带入参数 –systeminfo 中,并指定数据库位置(就是那个excel文件)
28+
```
29+
$ ./windows-exploit-suggester.py --database 2017-06-14-mssb.xls --systeminfo win7sp1-systeminfo.txt
30+
[*] initiating...
31+
[*] database file detected as xls or xlsx based on extension
32+
[*] reading from the systeminfo input file
33+
[*] querying database file for potential vulnerabilities
34+
[*] comparing the 15 hotfix(es) against the 173 potential bulletins(s)
35+
[*] there are now 168 remaining vulns
36+
[+] windows version identified as 'Windows 7 SP1 32-bit'
37+
[*]
38+
[M] MS14-012: Cumulative Security Update for Internet Explorer (2925418) - Critical
39+
[E] MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2880430) - Important
40+
[M] MS13-090: Cumulative Security Update of ActiveX Kill Bits (2900986) - Critical
41+
[M] MS13-080: Cumulative Security Update for Internet Explorer (2879017) - Critical
42+
[M] MS13-069: Cumulative Security Update for Internet Explorer (2870699) - Critical
43+
[M] MS13-059: Cumulative Security Update for Internet Explorer (2862772) - Critical
44+
[M] MS13-055: Cumulative Security Update for Internet Explorer (2846071) - Critical
45+
[M] MS13-053: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2850851) - Critical
46+
[M] MS13-009: Cumulative Security Update for Internet Explorer (2792100) - Critical
47+
[M] MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Important
48+
[*] done
49+
```
50+
下面这条指令可以列出指定操作系统版本存在的所有可能EXP(假设目标系统没有打任何补丁)
51+
```
52+
$ ./windows-exploit-suggester.py --database 2017-06-14-mssb.xls --ostext 'windows server 2008 r2'
53+
[*] initiating...
54+
[*] database file detected as xls or xlsx based on extension
55+
[*] getting OS information from command line text
56+
[*] querying database file for potential vulnerabilities
57+
[*] comparing the 0 hotfix(es) against the 196 potential bulletins(s)
58+
[*] there are now 196 remaining vulns
59+
[+] windows version identified as 'Windows 2008 R2 64-bit'
60+
[*]
61+
[M] MS13-009: Cumulative Security Update for Internet Explorer (2792100) - Critical
62+
[M] MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Important
63+
[E] MS11-011: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802) - Important
64+
[M] MS10-073: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957) - Important
65+
[M] MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) - Critical
66+
[E] MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799) - Im
67+
```

0 commit comments

Comments
 (0)