Patch Check Advanced<\/a> do this job very effectively.\u00a0 Exploit-suggester purposefully omits details of vulnerabilities for which public exploit code is not available.<\/p>\nIt does not aim to reference all known exploit code, just to list enough help you get root.<\/p>\n
It doesn’t provide the exploit code or tell you how to use it.\u00a0 It simply points you in the right direction.<\/p>\n
Links to descriptions of the vulnerabilities are provided, but this tool will not tell you about about the nature of the vulnerbility, fixes, recommendations or anything else that might help with reporting.<\/p>\n
Installation<\/h3>\n
Exploit-suggester is just a PERL script, so installation should be trivial.\u00a0 Simply place exploit-suggester.pl somehwere in your PATH.\u00a0 The database file sploitdb.xml must be in the same directory as exploit-suggester.pl.<\/p>\n
You may need to install the XML::Simple PERL module first.\u00a0 If it’s not available through your package manager, you can get it from CPAN:<\/p>\n
# perl -MCPAN -e shell<\/pre>\n> install XML::Simple<\/pre>\nExample Output<\/h3>\n$ head showrev.out\r\nPatch: 109618-01 Obsoletes: Requires: Incompatibles: Packages: SUNWeuxwe, SUNWeuezt, SUNWeudlg, SUNWeudda\r\nPatch: 109889-01 Obsoletes: 109353-04 Requires: Incompatibles: Packages: SUNWkvmx, SUNWkvm, SUNWmdb, SUNWhea, SUNWpstl, SUNWpstlx\r\nPatch: 110369-05 Obsoletes: 110709-02 Requires: Incompatibles: Packages: SUNWkvmx, SUNWcarx, SUNWcsr<\/pre>\n...<\/pre>\n$ .\/exploit-suggestions.pl 8 sparc showrev.out\r\nexploit-suggester v0.1 ( http:\/\/pentestmonkey.net\/tools\/exploit-suggester )\r\n\r\n -------------------------------------------------------------\r\n| Runtime options |\r\n -------------------------------------------------------------\r\nSolaris version: ................ 8\r\nArchitecture: ................... sparc\r\nPatch file: ..................... showrev.out\r\nExploit database: ............... sploitdb.txt\r\nDon't list sploits rated as ..... N\/A - Exclude no ratings\r\nList only sploits rated as ...... N\/A - List any rating\r\nList only local sploits ......... N\/A - Show both\r\n\r\n -------------------------------------------------------------\r\n| Suggested Exploits |\r\n -------------------------------------------------------------\r\nDescription: 'at' Arbitrary File Deletion\r\nRemote: 0\r\nExploit Rating: 1 (Sploit normally works)\r\nPatch installed: 108875-10\r\nMin vulnerable patch: 108875-00\r\nMax vulnerable patch: 108875-12\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/isec-solaris-at-rm.c\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/solaris-at.c\r\nInfo Link: http:\/\/securityfocus.com\/bid\/6693\r\n\r\nDescription: \/usr\/ucb\/ps information leakage\r\nRemote: 0\r\nExploit Rating: 1 (Sploit normally works)\r\nPatch installed: 109023-01\r\nMin vulnerable patch: 109023-00\r\nMax vulnerable patch: 109023-05\r\nExploit Link: http:\/\/milw0rm.com\/exploits\/2242\r\nNote: Local environment variable leakage: \/usr\/ucb\/ps -auxgeww\r\n\r\nDescription: KCMS Arbitrary File Reading Vulnerability\r\nRemote: 1\r\nExploit Rating: 1 (Sploit normally works)\r\nPatch installed: 111400-01\r\nMin vulnerable patch: 111400-00\r\nMax vulnerable patch: 111400-01\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/solaris_kcms_readfile.pm\r\nInfo Link: http:\/\/securityfocus.com\/bid\/6665\r\n\r\nDescription: X11 Keyboard Extension Overflow\r\nRemote: 0\r\nExploit Rating: 1 (Sploit normally works)\r\nPatch installed: 119067-00\r\nMin vulnerable patch: 119067-00\r\nMax vulnerable patch: 119067-03\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/raptor_xkb.c\r\nInfo Link: http:\/\/www.securityfocus.com\/bid\/19905\r\n\r\nDescription: libdthelp Overflow Privilege Escalation\r\nRemote: 0\r\nExploit Rating: 1 (Sploit normally works)\r\nPatch installed: 108949-07\r\nMin vulnerable patch: 108949-00\r\nMax vulnerable patch: 108949-08\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/raptor_libdthelp.c\r\nInfo Link: http:\/\/www.securityfocus.com\/bid\/8973\r\n\r\nDescription: priocntl Vulnerability\r\nRemote: 0\r\nExploit Rating: 1 (Sploit normally works)\r\nPatch installed: 108528-13\r\nMin vulnerable patch: 108528-00\r\nMax vulnerable patch: 108528-17\r\nExploit Link: http:\/\/archive.cert.uni-stuttgart.de\/bugtraq\/2002\/11\/msg00359.html\r\nInfo Link: http:\/\/securityfocus.com\/bid\/6262\r\n\r\nDescription: sadmind Authentication Spoofing\r\nRemote: 1\r\nExploit Rating: 1 (Sploit normally works)\r\nPatch installed: 116455-00\r\nMin vulnerable patch: 116455-00\r\nMax vulnerable patch: 116455-00\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/solaris_sadmind_exec.pm\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/rootdown.plm\r\nInfo Link: http:\/\/securityfocus.com\/bid\/8615\r\n\r\nDescription: vfs_getvfssw Kernel Module Loading Vulnerability\r\nRemote: 0\r\nExploit Rating: 1 (Sploit normally works)\r\nPatch installed: 108528-13\r\nMin vulnerable patch: 108528-00\r\nMax vulnerable patch: 108528-26\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/solaris_vfs_getvfssw.tar\r\nInfo Link: http:\/\/securityfocus.com\/bid\/9962\r\nNote: DoS risk if you insert the wrong kernel module\r\n\r\nDescription: whodo Overflow\r\nRemote: 0\r\nExploit Rating: 2 (Sploit untested)\r\nPatch installed: 111826-00\r\nMin vulnerable patch: 111826-00\r\nMax vulnerable patch: 111826-00\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/whodoexp.c\r\nInfo Link: http:\/\/securityfocus.com\/bid\/2935\r\n\r\nDescription: LD_PRELOAD Privilege Escalation\r\nRemote: 0\r\nExploit Rating: 3 (Sploit normally fails)\r\nPatch installed: 109147-12\r\nMin vulnerable patch: 109147-07\r\nMax vulnerable patch: 109147-24\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/raptor_ldpreload.c\r\nInfo Link: http:\/\/www.securityfocus.com\/bid\/8305\/info\r\n\r\nDescription: libsldap Overflow\r\nRemote: 0\r\nExploit Rating: 3 (Sploit normally fails)\r\nPatch installed: 111091-00\r\nMin vulnerable patch: 111091-00\r\nMax vulnerable patch: 111091-02\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/libsldap-exp.c\r\nExploit Link: http:\/\/www.securityfocus.com\/data\/vulnerabilities\/exploits\/ldap_exp2.c\r\nInfo Link: http:\/\/securityfocus.com\/bid\/2931<\/pre>\nLimitations<\/strong><\/p>\nCurrently the database is biased towards exploiting Solaris 8 on SPARC.\u00a0 I’ll update the database to more fully support other flavours of Solaris later.\u00a0 I might also implement limited support for Windows and Linux too at some stage.<\/p>\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try.\u00a0 It currently focusses on local exploitation of Solaris 8 on SPARC, but other version of Solaris are partially supported. Features The current version of exploit-suggester has the following features: Restrict search to […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[14],"tags":[73,19,76],"_links":{"self":[{"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/posts\/108"}],"collection":[{"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/comments?post=108"}],"version-history":[{"count":2,"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/posts\/108\/revisions"}],"predecessor-version":[{"id":415,"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/posts\/108\/revisions\/415"}],"wp:attachment":[{"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/media?parent=108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/categories?post=108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pentestmonkey.net\/wp-json\/wp\/v2\/tags?post=108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}