Metasploit-exploitdb: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 15: | Zeile 15: | ||
=Erstellen eines Directories für das Modul= | =Erstellen eines Directories für das Modul= | ||
*mkdir -p ~/.msf4/modules/exploits/cgi/webapps | *mkdir -p ~/.msf4/modules/exploits/cgi/webapps | ||
| + | =Kopieren des Moduls= | ||
| + | *cp /usr/share/exploitdb/exploits/cgi/webapps/42344.rb ~/.msf4/modules/exploits/cgi/webapps/ | ||
=Links= | =Links= | ||
https://kalinull.medium.com/how-to-add-a-module-to-metasploit-from-exploit-db-d389c2a33f6d | https://kalinull.medium.com/how-to-add-a-module-to-metasploit-from-exploit-db-d389c2a33f6d | ||
Version vom 6. August 2021, 18:10 Uhr
Hinzufügen eines Exploits aus der exploitdb
- searchsploit sonicwall 8.1.0.2-14sv
------------------------------------------------------------------------------------------------------------------------ --------------------------------- Exploit Title | Path ------------------------------------------------------------------------------------------------------------------------ --------------------------------- Sonicwall 8.1.0.2-14sv - 'extensionsettings.cgi' Remote Command Injection (Metasploit) | hardware/webapps/41415.rb Sonicwall 8.1.0.2-14sv - 'viewcert.cgi' Remote Command Injection (Metasploit) | hardware/webapps/41416.rb Sonicwall < 8.1.0.2-14sv - 'sitecustomization.cgi' Command Injection (Metasploit) | cgi/webapps/42344.rb Sonicwall Secure Remote Access 8.1.0.2-14sv - Command Injection | cgi/webapps/42342.txt ------------------------------------------------------------------------------------------------------------------------ --------------------------------- Shellcodes: No Results Papers: No Results
Erstellen eines Directories für das Modul
- mkdir -p ~/.msf4/modules/exploits/cgi/webapps
Kopieren des Moduls
- cp /usr/share/exploitdb/exploits/cgi/webapps/42344.rb ~/.msf4/modules/exploits/cgi/webapps/
Links
https://kalinull.medium.com/how-to-add-a-module-to-metasploit-from-exploit-db-d389c2a33f6d