O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding search options in searchsploit

There are several parameters you can search for using searchsploit; try the following examples.

  1. The following command will search just the titles of the exploit database for windows and remote, allowing you to find the potential remote windows vulnerabilities:
searchsploit -t windows remote
  1. If you exported your nmap or zenmap results in an XML format, you can search against that for exploits. Run a quick nmap and output its results to /root/test.xml. The following command is used to search against that output file and will provide you with a list of exploits for your nmap search:
searchsploit --nmap /root/test.xml

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required