How to Find Exploits Using the Exploit Database in Kali (Part 1)



Fire Up Kali & Open a Browser

[FONT=&amp]Let's start by firing up Kali and opening a browser, such as Iceweasel, the default browser in Kali (EDB can be reached from any browser, in any operating system). If we use the default browser in Kali, we can see that there is a built-in shortcut to the "Exploit-DB" in the browser shortcut bar, as seen below.[/FONT]

[FONT=&amp]When we click on it, it takes us to the Exploit Database, as seen below.[/FONT]

[FONT=&amp]If you are not using Iceweasel and its built-in shortcut, you can navigate to Exploit-DB by typing in the URL bar.[/FONT]Step 2Search the Exploit Database

[FONT=&amp]If we look at the top menu bar in the Exploit Database website, second from the right is a menu item called "Search". When we click on it, it enables us to search the database of exploits and returns a search function screen similar to the screenshot below.[/FONT]

[FONT=&amp]Let's use this search function to find some recent Windows exploits (we are always looking for new Windows exploits, aren't we?). In the search function window, we can enter any of the following information;[/FONT]
[FONT=&amp]The last two fields can be used if you are specifically looking for an exploit that takes advantage of a known, numbered vulnerability in either of those databases.[/FONT][FONT=&amp]In the Platform field, enter "Windows", in the Type field, enter "remote", and in the Free Text Search box, enter "Office". When we do so, the Exploit Database returns a list and a link to all of the exploits that meet those criteria. Of course, you can put in whatever criteria you are searching for. I am only using these as an example.[/FONT]



New Member
Registered User
Jun 19, 2019
thanks its helpfull .....Thanks for the tutorial.
Top Bottom