When we want to hack a system, we need a specific exploit to take advantage of a certain vulnerability in the operating system, service, or application. There are many exploits available in the world. Remember, there is no s specific exploit that will allow you to exploit all systems. You need to find an exploit that will suit your target system. In such cases the Exploit Database will help us.
EDB is a project of Offensive Security, who developed back Track and kali Linux. This project is the ultimate archive of exploits, shellcode, and security whitepapers. You can easily find different kinds of exploits including: Remote exploits, Web Application exploits, Local and Privilege Escalation exploits, Denial of Service exploits and shellcode exploits. Then, if you feel it will work on your target, you can simply copy and paste it into Kali for your attack. Exploits are categorized by platform, type, language, port, etc in this project.
What is SearchSploit?
Searchsploit is a command line search tool for Exploit-DB that allows you to take a copy of Exploit Database with you. SearchSploit makes you able to perform off-line searches through your local copy of the repository. This capability is particularly useful for security assessments on networks without Internet access.
How to Install SearchSploit on Kali Linux
To install searchsploit, you can git clone method to directly clone the searchsploit into your Kali from Github repository.
Then update your system and install this tool using the following command:
apt update && apt -y install exploitdb
By using “-h“, you can see all the features and options that are available to you:
[email protected]:~# searchsploit -h
Usage: searchsploit [options] term1 [term2] ... [termN]
searchsploit afd windows local
searchsploit -t oracle windows
searchsploit -p 39446
searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"
For more examples, see the manual: https://www.exploit-db.com/searchsploit/
-c, --case [Term] Perform a case-sensitive search (Default is inSEnsITiVe).
-e, --exact [Term] Perform an EXACT match on exploit title (Default is AND) [Implies "-t"].
-h, --help Show this help screen.
-j, --json [Term] Show result in JSON format.
-m, --mirror [EDB-ID] Mirror (aka copies) an exploit to the current working directory.
-o, --overflow [Term] Exploit titles are allowed to overflow their columns.
-p, --path [EDB-ID] Show the full path to an exploit (and also copies the path to the clipboard if possible).
-t, --title [Term] Search JUST the exploit title (Default is title AND the file's path).
-u, --update Check for and install any exploitdb package updates (deb or git).
-w, --www [Term] Show URLs to Exploit-DB.com rather than the local path.
-x, --examine [EDB-ID] Examine (aka opens) the exploit using $PAGER.
--colour Disable colour highlighting in search results.
--id Display the EDB-ID value rather than local path.
--nmap [file.xml] Checks all results in Nmap's XML output with service version (e.g.: nmap -sV -oX file.xml).
Use "-v" (verbose) to try even more combinations
--exclude="term" Remove values from results. By using "|" to separated you can chain multiple values.
* You can use any number of search terms.
* Search terms are not case-sensitive (by default), and ordering is irrelevant.
* Use '-c' if you wish to reduce results by case-sensitive searching.
* And/Or '-e' if you wish to filter results by using an exact match.
* Use '-t' to exclude the file's path to filter the search results.
* Remove false positives (especially when searching using numbers - i.e. versions).
* When updating or displaying help, search terms will be ignored.
Type this command to search the exploits of Linux Kernel 3.2:
searchsploit linux kernel 3.2
It will list all the exploits related to Linux Kernel.
You can type “searchsploit Apache 2.x” to see exploits related to Apache 2.x:
Keeping SearchSploit Up-to-Date
To update SearchSploit, all you need to do is run the following:
$ searchsploit –u
Congratulations! You have learned how to Install SearchSploit on Kali Linux.
If you are facing any problem with the installation, fell free to comment here. We will help you to solve the issue.