O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Run a simple query

We will run a simple query against our searchsploit database:

  1. From the main terminal prompt, let's run a simple query looking for a known SMB vulnerability, MS17-010. You may recognize this as the vulnerability associated with WannaCry as well as other various malware worms:
searchsploit MS17-010
  1. You will receive the following output:
Searchsploit console output
  1. Let's take a look at some of the specifics related to one of the query results:
nano /usr/share/exploitdb/platforms/windows/dos/41891.rb
  1. The following output will show you that you are looking at a Metasploit module. This module is specifically designed to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required