Finding Public Exploits

Original Source:

There are thousands of exploits out in the wild, even more being traded privately or held back as 0 days. Clearly we want to get access to as many of these resources as we can to maximize the chance of successful exploitation. A warning must be given to anyone downloading exploits. There are several fake exploits out there specifically designed to harm or destroy your computer. Never download exploits from a source and run them without first checking what they do and what commands they will be executing on your system. It’s highly recommended that you decode any encoded values to find what they actually mean. For example this exploit when decoded runs the “rm -rf” command on your system. Saying that, some of the resources outlined here such as exploit-db and security focus can be considered pretty trustworthy.

In my opinion one of the best exploit resources on the web. Maintained by the fantastic guys at Offensive Security it would be the go to place when searching for public exploits.

The exploit-db collection of exploits is mirrored locally on Kali machines. Using the command searchsploit <search term> you can bring up a listing of exploits. Be aware that the search must be in all lower case.

Metasploit has a range of exploits built in and can be searched with the “search” command. You can also grep the search results with the syntax “grep <grep term> search <search term>”. Filters are also provided to let you narrow down your search specifically to exploits if desired.

Although in my opinion not as comprehensive as exploit-db you still occasionally turn up a working proof of concept at security focus that isn’t mirrored elsewhere. In general a good site to check.

I can’t speak for the reliability of the site as I haven’t used it much, however this is another resource when searching for exploits. Semi-0 day (for want of a better term) exploits are sometimes also sold here before eventually leaking out to everyone.

As with most things perhaps your strongest tool. So often with penetration testing you don’t actually know what specific exploit you’re searching for, or if one exists, but rather seeing what is likely to be out there. Many times you’ll run across blogs and researchers putting up relevant snippets of code for exploiting an application you happen to be looking at. I highly recommend researching any applications / services you’re attacking in Google.

That really covers the main methods of finding public exploits. Further useful techniques can be to search places such as to identify if CVE’s have been identified in the software or if there “should” be exploits out there for the version / application you’re examining. It can also give you handy CVE numbers to focus your search on.

Mount and Modify a Windows Image Using DISM

You can use the Deployment Image Servicing and Management (DISM) tool to mount a Windows image from a WIM or VHD file. Mounting an image maps the contents of the image to a directory so that you can service the image using DISM without booting into the image. You can also perform common file operations, such as copying, pasting, and editing on a mounted image.

Read more at –