<head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>kali工具箱</title>
<script src="./static/bootstrap.min.js"></script>
<link rel="stylesheet" href="./static/main.css">
<link rel="stylesheet" href="./static/bootstrap.min.css">
<style type="text/css" id="syntaxhighlighteranchor"></style>
</head>
<main class="main-container ng-scope" ng-view="">
<div class="main receptacle post-view ng-scope">
<article class="entry ng-scope" ng-controller="EntryCtrl" ui-lightbox="">
<section class="entry-content ng-binding" ng-bind-html="postContentTrustedHtml">
<h2> Linux的漏洞Suggester包装说明</h2><p style="text-align: justify;">正如其名称所暗示的，这是一个Linux漏洞Suggester，没有多余的装饰，没有花哨的功能;只是一个简单的脚本来跟踪漏洞并提出可能的漏洞利用获得“根”上合法的渗透测试，或理事检查身体</p><p>资料来源：http://penturalabs.wordpress.com/2013/08/26/linux-exploit-suggester/ <br> <a href="http://penturalabs.wordpress.com/2013/08/26/linux-exploit-suggester/" variation="deepblue" target="blank">Linux的漏洞Suggester首页</a> | <a href="http://git.kali.org/gitweb/?p=packages/linux-exploit-suggester.git;a=summary" variation="deepblue" target="blank">卡利Linux的漏洞Suggester回购</a> </p><ul><li>作者：安迪</li><li>许可：GPL第二版</li></ul><h3>包括在Linux的开发，suggester封装工具</h3><h5> Linux的开发，suggester </h5><p>脚本跟踪漏洞，并提出可能的漏洞</p><code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="05776a6a71456e64696c">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# linux-exploit-suggester<br>
<br>
You will find linux-exploit-suggester in /usr/share/linux-exploit-suggester</code><h3> Linux的开发，suggester用法示例</h3><p>搜索利用Linux的内核匹配<b><i>3.0.0（-k 3.0.0）：</i></b> </p><code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="e694898992a68d878a8f">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:/usr/share/linux-exploit-suggester# ./Linux_Exploit_Suggester.pl -k 3.0.0<br>
<br>
Kernel local: 3.0.0<br>
<br>
Possible Exploits:<br>
[+] semtex<br>
   CVE-2013-2094<br>
   Source: http://www.exploit-db.com/download/25444/‎<br>
[+] memodipper<br>
   CVE-2012-0056<br>
   Source: http://www.exploit-db.com/exploits/18411/<br>
[+] perf_swevent<br>
   CVE-2013-2094<br>
   Source: http://www.exploit-db.com/download/26131</code><div style="display:none">
<script src="//s11.cnzz.com/z_stat.php?id=1260038378&web_id=1260038378" language="JavaScript"></script>
</div>
</main></body></html>
