Manual Exploitation

Sometimes there may be an exploit available from searchsploit, or some POC on github, but there won't be a Metasploit module for it. This is when we need to manually run these exploits

Searchsploit

Searchsploit is great here because when you search for a service, it will also show you the path to some exploit code written for each vulnerability in the path column to the right. Simply copy the code to your working directory

cp /usr/share/exploitdb/explots/[path] .

BE SURE TO READ ALL EXPLOITS BEFORE RUNNING THEM

You may also need to compile some of these if they are c files (there may be different compilation instructions in the file itself)

gcc -o [filename] [exploit].c

Most other filetypes are generally scripts that run through an interpreter (python, ruby, java, bash, perl, etc)

Last updated