Metasploit-exploitdb: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 13: | Zeile 13: | ||
Papers: No Results | Papers: No Results | ||
</pre> | </pre> | ||
| + | =Erstellen eines Directories für das Modul= | ||
| + | *mkdir -p ~/.msf4/modules/exploits/cgi/webapps | ||
=Links= | =Links= | ||
https://kalinull.medium.com/how-to-add-a-module-to-metasploit-from-exploit-db-d389c2a33f6d | https://kalinull.medium.com/how-to-add-a-module-to-metasploit-from-exploit-db-d389c2a33f6d | ||
Version vom 6. August 2021, 18:09 Uhr
Hinzufügen eines Exploits aus der exploitdb
- searchsploit sonicwall 8.1.0.2-14sv
------------------------------------------------------------------------------------------------------------------------ --------------------------------- Exploit Title | Path ------------------------------------------------------------------------------------------------------------------------ --------------------------------- Sonicwall 8.1.0.2-14sv - 'extensionsettings.cgi' Remote Command Injection (Metasploit) | hardware/webapps/41415.rb Sonicwall 8.1.0.2-14sv - 'viewcert.cgi' Remote Command Injection (Metasploit) | hardware/webapps/41416.rb Sonicwall < 8.1.0.2-14sv - 'sitecustomization.cgi' Command Injection (Metasploit) | cgi/webapps/42344.rb Sonicwall Secure Remote Access 8.1.0.2-14sv - Command Injection | cgi/webapps/42342.txt ------------------------------------------------------------------------------------------------------------------------ --------------------------------- Shellcodes: No Results Papers: No Results
Erstellen eines Directories für das Modul
- mkdir -p ~/.msf4/modules/exploits/cgi/webapps
Links
https://kalinull.medium.com/how-to-add-a-module-to-metasploit-from-exploit-db-d389c2a33f6d