|
| 1 | +## 使用方法 |
| 2 | + |
| 3 | +1.首先需要更新漏洞数据库 |
| 4 | +``` |
| 5 | +$ ./windows-exploit-suggester.py --update |
| 6 | +[*] initiating... |
| 7 | +[*] successfully requested base url |
| 8 | +[*] scraped ms download url |
| 9 | +[+] writing to file 2017-06-14-mssb.xls |
| 10 | +[*] done |
| 11 | +``` |
| 12 | + |
| 13 | +2.然后安装程序依赖:[python-xlrd](https://pypi.python.org/pypi/xlrd) |
| 14 | +``` |
| 15 | +ubuntu@ubuntu:~/xlrd-0.9.4/xlrd-0.9.4$ sudo python setup.py install |
| 16 | +[sudo] password for ubuntu: |
| 17 | +running install |
| 18 | +running build |
| 19 | +running build_py |
| 20 | +running build_scripts |
| 21 | +running install_lib |
| 22 | +creating /usr/local/lib/python2.7/dist-packages/xlrd |
| 23 | +copying build/lib.linux-x86_64-2.7/xlrd/compdoc.py -> /usr/local/lib/python2.7/dist-packages/xlrd |
| 24 | +...... |
| 25 | +``` |
| 26 | + |
| 27 | +3.接着在目标机器中执行systeminfo,并将其输出到文件 win7sp1-systeminfo.txt 中,然而带入参数 –systeminfo 中,并指定数据库位置(就是那个excel文件) |
| 28 | +``` |
| 29 | +$ ./windows-exploit-suggester.py --database 2017-06-14-mssb.xls --systeminfo win7sp1-systeminfo.txt |
| 30 | +[*] initiating... |
| 31 | +[*] database file detected as xls or xlsx based on extension |
| 32 | +[*] reading from the systeminfo input file |
| 33 | +[*] querying database file for potential vulnerabilities |
| 34 | +[*] comparing the 15 hotfix(es) against the 173 potential bulletins(s) |
| 35 | +[*] there are now 168 remaining vulns |
| 36 | +[+] windows version identified as 'Windows 7 SP1 32-bit' |
| 37 | +[*] |
| 38 | +[M] MS14-012: Cumulative Security Update for Internet Explorer (2925418) - Critical |
| 39 | +[E] MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2880430) - Important |
| 40 | +[M] MS13-090: Cumulative Security Update of ActiveX Kill Bits (2900986) - Critical |
| 41 | +[M] MS13-080: Cumulative Security Update for Internet Explorer (2879017) - Critical |
| 42 | +[M] MS13-069: Cumulative Security Update for Internet Explorer (2870699) - Critical |
| 43 | +[M] MS13-059: Cumulative Security Update for Internet Explorer (2862772) - Critical |
| 44 | +[M] MS13-055: Cumulative Security Update for Internet Explorer (2846071) - Critical |
| 45 | +[M] MS13-053: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2850851) - Critical |
| 46 | +[M] MS13-009: Cumulative Security Update for Internet Explorer (2792100) - Critical |
| 47 | +[M] MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Important |
| 48 | +[*] done |
| 49 | +``` |
| 50 | +下面这条指令可以列出指定操作系统版本存在的所有可能EXP(假设目标系统没有打任何补丁) |
| 51 | +``` |
| 52 | +$ ./windows-exploit-suggester.py --database 2017-06-14-mssb.xls --ostext 'windows server 2008 r2' |
| 53 | +[*] initiating... |
| 54 | +[*] database file detected as xls or xlsx based on extension |
| 55 | +[*] getting OS information from command line text |
| 56 | +[*] querying database file for potential vulnerabilities |
| 57 | +[*] comparing the 0 hotfix(es) against the 196 potential bulletins(s) |
| 58 | +[*] there are now 196 remaining vulns |
| 59 | +[+] windows version identified as 'Windows 2008 R2 64-bit' |
| 60 | +[*] |
| 61 | +[M] MS13-009: Cumulative Security Update for Internet Explorer (2792100) - Critical |
| 62 | +[M] MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Important |
| 63 | +[E] MS11-011: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802) - Important |
| 64 | +[M] MS10-073: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957) - Important |
| 65 | +[M] MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) - Critical |
| 66 | +[E] MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799) - Im |
| 67 | +``` |
0 commit comments