How to Easily Find an Exploit in Exploit DB and Get It Compiled All from Your Terminal.

Aug 11, 2015 06:26 AM
Aug 11, 2015 06:17 PM
635748459869788978.jpg

Hello everyone! Hope everyone having good day!! I wanted to share an easy way to locate an appropriate exploit from the EDB, get it compiled, and run it all from inside the terminal.

A copy of every exploit listed on the Exploit Database, is already saved to our file systems. When a new exploit is published on the database, it will be auto-populated into our files when we update the VM.

Step 1: ./Serchsploit

In my example, I have a target I see is running Apache 2.0.x., which is no longer maintained, as the current versions are Apache 2.4.x and 2.2.x. Navigate to /usr/share/exploitdb

635748881796284920.jpg

# ./searchsploit apache 2.2

A number of exploits are returned. I narrow the appropriate exploits down based on the type of platform being used and any other applicable factors i learned during the recognizance phase.

635748886656576484.jpg

Step 2: Select Exploit and Copy to Root

My target is running Windows, so I'm going to try, exploit 3996.c. I'm going to copy the exploit on over to my root directory so it's easier to work with.

cp /usr/share/exploitdb/platform/windows/remote/3996.c /root/3996.c

Step 3: Review File Using Gedit

Navigate to /root and gedit the exploit.

gedit 3996.c

Review the exploit for additional information such as usage and requirements..

Step 4: Compile the Exploit

Finally, compile the exploit. In this example, my file is written in C+, as indicated by the '.c'. I'm also going to rename my exploit 'apache' by using switch '-o'

gcc 3996.c -o apache.

To run it I enter:

./apache

Step 5: Permissions

I don't think you'll have any issues with permissions at all in this example, but for some reason if you do, take permission of the file by issuing the following command, using the above example.

chmod +x ./apache

Hope you enjoyed!

Comments

No Comments Exist

Be the first, drop a comment!