Chapter 3 - Exploiting Vulnerabilities
Finding Exploits
Search Exploit-DB
Kali> searchsploit windows 2003 | grep -i localKali> searchsploit -x ######.pySearch Google
Google> site:exploit-db.com exploit kernel <= 3Search Metasploit
Kali> grep -R "W7" /usr/share/metasploit-framework/modules/exploit/windows/*Search Vulners
Compiling Exploits
Compile for Windows
Compile for Architectures
Catching Exploits
Breaking out of Virtualization
WebSockets
IPV6
HTTP
Headers
Webshells
Resources
XXE
Resources
XSS
Resources
CORS
CSRF
Resources
SSRF
Resources
Example
RCE
Server Side Template Injection
API
LFI
Resources
Examples
Open Redirects
Resources
RFI
Padding Oracle Attack
Resources
Arguments
Examples
AWS
File Upload
Make a backdoor GIF
Upload From CLI
E-Mail
iSCSI
Databases
MySQL
Resources
Examples
MSSQL
Resources
MongoDB
Resources
Examples
PBX
Examples
Last updated