{"id":318,"date":"2014-07-01T09:14:08","date_gmt":"2014-07-01T09:14:08","guid":{"rendered":"http:\/\/ixyzero.com\/blog\/?p=318"},"modified":"2014-07-01T09:14:08","modified_gmt":"2014-07-01T09:14:08","slug":"%e5%85%b3%e4%ba%8eexploit-db%e6%bc%8f%e6%b4%9e%e5%ba%93%e7%9a%84%e4%bd%bf%e7%94%a8","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/318.html","title":{"rendered":"\u5173\u4e8eExploit-DB\u6f0f\u6d1e\u5e93\u7684\u4f7f\u7528"},"content":{"rendered":"<p style=\"color: #454545;\">\u4e4b\u524d\u5728\u7f51\u4e0a\u770b\u5230\u4e86\u4e0d\u5c11\u4ecb\u7ecd\u5982\u4f55\u5347\u7ea7BackTrack\u548cKail Linux\u4e0a\u7684<a style=\"color: #5f9b12;\" href=\"http:\/\/www.91ri.org\/6976.html\" target=\"_blank\">Exploit-DB\u6f0f\u6d1e\u5229\u7528\u5e93<\/a>\u7684\u6587\u7ae0\uff0c\u89c9\u5f97\u4e0d\u9519\uff0c\u5f88\u53d7\u7528\uff0c\u6709\u65f6\u5019\u5c31\u60f3\u4e86\uff0c\u80fd\u4e0d\u80fd\u628a\u8fd9\u4e2a\u529f\u80fd\u653e\u5230Ubuntu\u7b49\u5176\u4ed6\u7684Linux\u4e0a\u53bb\u3002<\/p>\n<p style=\"color: #454545;\">\u4e8e\u662f\uff0c\u5c31\u53bb\u865a\u62df\u673a\u4e2d\u7684BackTrack\u4e2d\u770b\u770b\uff1a<\/p>\n<p style=\"color: #454545;\">\u5148\u5207\u6362\u5230\u201c\/pentest\/exploits\/exploitdb\/\u201d\u76ee\u5f55\uff0c\u67e5\u770b\u76ee\u5f55\u7ed3\u6784.vim\u67e5\u770b\u5176\u4e2d\u7684searchsploit\u6587\u4ef6\uff08\u5176\u5b9e\u5c31\u4e00\u53ef\u6267\u884c\u7684Shell\u811a\u672c\u6587\u4ef6\uff09,\u518d\u67e5\u770b\u76f8\u5173\u8054\u7684file.csv\u6587\u4ef6\uff08\u5176\u5b9e\u5c31\u4e00\u4e2a\u6f0f\u6d1e\u8bb0\u5f55\u8bf4\u660e\u6587\u4ef6\uff0ccsv\u683c\u5f0f\u7684\uff0c\u65b9\u4fbf\u4f7f\u7528awk\u7b49\u5de5\u5177\u5904\u7406\uff09\u3002\u6211\u4eec\u53ef\u4ee5\u53d1\u73b0searchsploit\u5176\u5b9e\u5c31\u662f\u4e00\u4e2a\u7b80\u5355\u7684shell\u811a\u672c\uff0c\u7528\u6765\u5904\u7406file.csv\u6587\u4ef6\u91cc\u9762\u7684\u5185\u5bb9\u7684\u3002\u5982\u679c\u4f60\u61c2\u5f97\u4e00\u70b9 bash\u7f16\u7a0b\u7684\u8bdd\uff0c\u5c31\u53ef\u4ee5\u8f7b\u677e\u4e86\u89e3\u201c.\/searchsploit item1 [item2] [item3]\u201d\u7684\u539f\u7406\u548c\u65b9\u6cd5\u5566<\/p>\n<p style=\"color: #454545;\">\u63a5\u4e0b\u6211\u4eec\u5728ubuntu\u4e0b\u521b\u5efaExploit-DB\u6f0f\u6d1e\u5229\u7528\u5e93\uff0c\u6b65\u9aa4\u5982\u4e0b\uff1a<\/p>\n<p style=\"color: #454545;\">1\u3001wget\u6700\u65b0\u7248\u672c\u7684\u201cExploit-DB\u6f0f\u6d1e\u5229\u7528\u5e93\u201d\uff0c\u547d\u4ee4\uff1a<\/p>\n<pre class=\"lang:default decode:true\">wget www.exploit-db.com\/archive.tar.bz2<\/pre>\n<p style=\"color: #2a2a2a;\">\u5982\u679c\u88ab\u5899\u4e86\u7684\u8bdd \uff0c\u53bbhttp:\/\/www.exploit-db.com\u4e0a\u4e0b\u8f7d\u5373\u53ef<\/p>\n<p style=\"color: #454545;\">2\u3001\u89e3\u538b\uff0c\u5c06\u5176\u4e2d\u7684file.csv\u6587\u4ef6\u3001platforms\u6587\u4ef6\u5939\u548csearchsploit\u811a\u672c\u653e\u5728Ubuntu\u4e0a\u7684\u4e00\u4e2a\u6587\u4ef6\u5939\u4e2d\u5373\u53ef\u3002<\/p>\n<p style=\"color: #454545;\">3\u3001\u4fee\u6539searchsploit\u811a\u672c\u4e2d\u7684\u4e00\u4e9b\u5185\u5bb9\uff1b<\/p>\n<p style=\"color: #454545;\">====<\/p>\n<p style=\"color: #454545;\">\u5177\u4f53\u7684searchsploit\u811a\u672c\u5185\u5bb9\u5982\u4e0b\uff1a<\/p>\n<pre class=\"lang:sh decode:true \">#!\/bin\/bash\n# exploitdb CLI search tool\n\ncsvpath=.\/files.csv     #\u4fee\u6539file.csv\u7684\u8def\u5f84\u4ee5\u6b63\u5e38\u4f7f\u7528\".\/searchsploit\"\u547d\u4ee4\n\nUSAGE=\"Usage: `basename $0` [term1] [term2] [term3]\nExample: `basename $0` oracle windows local\n\nUse lower case in the search terms; second and third terms are optional.\n`basename $0` will search each line of the csv file left to right so order your search terms accordingly.\n(ie: 'oracle local' will yield better results than 'local oracle')\"\n\nif [ $# -eq 0 ]; then\n    echo -e $USAGE &gt;&amp;2    #\u5176\u4e2d\u7684\"-e\"\u9009\u9879\u662f\u4e3a\u4e86\u5c06\u539f\u811a\u672c\u4e2d\u53d8\u91cf$USAGE\u4e2d\u7684\"n\"\u89e3\u91ca\u51fa\u6765\n    exit 1\nfi\n\necho \" Description Path and Date\"\necho --------------------------------------------------------------------------- -------------------------\n\nawk -F \"\"*,\"*\" '{printf \"%-75s %sn\", $3, $2, $4}' $csvpath | awk 'tolower($0) ~ \/'$1'\/ &amp;&amp; \/'$2'\/ &amp;&amp; \/'$3'\/' | sed s\/platforms\/\/\n# \u6211\u591a\u52a0\u4e86\u4e00\u4e2a\u663e\u793a\u201c\u65e5\u671f\u201d\u7684\u529f\u80fd\uff0c\u65b9\u4fbf\u77e5\u9053\u8fd9\u662f\u4ec0\u4e48\u65f6\u5019\u7206\u51fa\u6765\u7684\uff0c\u81ea\u5df1\u53ef\u4ee5\u4f30\u8ba1\u4e00\u4e0b\u53ef\u7528\u6027\u8fd8\u6709\u591a\u5c11\n# {awk -F \"\"*,\"*\"}\u8fd9\u91cc\u7684\u610f\u601d\u5e94\u8be5\u662f\uff1a\u4ee5,\u6216\",\u6216,\"\u4e3a\u201c\u5206\u9694\u7b26\u201d\uff0c\u7ec8\u4e8e\u660e\u767d\u4e86\uff0c\u8fd8\u662f\u81ea\u5df1\u6700\u7ed9\u529b\uff1b\n# awk 'tolower($0) ~ \/'$1'\/ &amp;&amp; \/'$2'\/ &amp;&amp; \/'$3'\/' \u5c06$0\u8f6c\u6362\u4e3a\u5c0f\u5199\uff0c\u7136\u540e\u4e0e\"$1\"|\"$2\"|\"$3\"\u8fdb\u884c\u77ed\u8def\u5339\u914d\uff1b\n# \u6700\u540e\u7684\"sed s\/platforms\/\/\"\u662f\u5c06\u5339\u914d\u7ed3\u679c\u4e2d\u7684\"platforms\"\u7ed9\u53bb\u6389\u3002\n\n# searchsploit\u8fd9\u4e2a\u811a\u672c\u4e3b\u8981\u662f\u5229\u7528\u4e86awk\u5bf9file.csv\u6587\u4ef6\u4e2d\u7684\u6f0f\u6d1e\u540d\u79f0\u8fdb\u884c\u5feb\u901f\u641c\u7d22\u5339\u914d\uff0c\u7136\u540e\u7ed9\u51fa\u641c\u7d22\u7684\u7ed3\u679c\uff0c\u5e76\u4e14\u4e0efile.csv\u6587\u4ef6\u7684\u5185\u5bb9\u7ed3\u6784\u7d27\u5bc6\u76f8\u5173(\u5982\u4e0b\u6240\u793a)\n\n# \u5728\u8f93\u51fa\u663e\u793a\u7684\u65f6\u5019\uff0c\u670975\u5217\"-\"\u7528\u4e8e\u5206\u9694\u6f0f\u6d1e\u540d\u79f0\u90a3\u4e00\u5217\uff0c\u4e4b\u6240\u4ee5\u53d675\u5217\u662f\u56e0\u4e3a\u5927\u591a\u6570\u201c\u6f0f\u6d1e\u540d\u79f0\u201d\u90fd\u572875\u4e2a\u5b57\u7b26\u4ee5\u4e0b\uff0c\u4e0d\u4f1a\u5f15\u8d77\u6362\u884c(\u5f53\u7136\u6709\u5c11\u91cf\u7279\u4f8b\u9664\u5916)\n#---------------------------------<\/pre>\n<p>\u5dee\u4e0d\u591a\u5c31\u8fd9\u6837\u4e86\uff0c\u9700\u8981\u6ce8\u610f\u7684\u4e00\u70b9\u5c31\u662f\uff0c\u89e3\u538b\u51fa\u7684\u6587\u4ef6\u5185\u5bb9\u4e2d\u53ef\u80fd\u4f1a\u88ab\uff08\u5e94\u8be5\u662f\u80af\u5b9a\uff09\u6740\u6bd2\u8f6f\u4ef6\u62a5\u8b66\u63d0\u793a\uff0c\u539f\u56e0\u561b\uff0c\u4f60\u5e94\u8be5\u61c2\u7684\uff0c\u8fd9\u4e48\u591aexploit\u811a\u672c\uff0c\u5982\u679c\u4e0d\u62a5\u7684\u8bdd\uff0c\u8fd9\u4e2a\u6740\u8f6f\u662f\u4e0d\u662f\u4f1a\u6709\u70b9\u95ee\u9898\uff1f<\/p>\n<p>PS\uff1a\u5176\u5b9e\u770b\u4e86\u811a\u672c\u4e4b\u540e\u4f60\u4e5f\u5e94\u8be5\u5df2\u7ecf\u77e5\u9053\uff0c\u5982\u679c\u4ec5\u4ec5\u53ea\u662f\u67e5\u8be2\u6f0f\u6d1e\u7684\u8bdd\uff0c\u6709file.csv\u6587\u4ef6\u548csearchsploit\u811a\u672c\u5c31\u591f\u4e86\uff0c\u4f46\u56e0\u4e3a\u4f60\u5728\u627e\u5230\u4e86Exploit-DB\u4e0a\u7206\u51fa\u7684\u6f0f\u6d1e\u65f6\uff0c\u9700\u8981\u770b\u770bexp\u6216poc\u4ee3\u7801\uff0c\u6240\u4ee5\uff0c\u4e00\u822c\u60c5\u51b5\u4e0b\u4f60\u9700\u8981\u4e0b\u8f7d\u6574\u4e2a\u538b\u7f29\u5305\uff08http:\/\/www.exploit-db.com\/archive.tar.bz2\uff09\u3002<\/p>\n<h6>\u539f\u6587\u5730\u5740\uff1a<\/h6>\n<p>\u5173\u4e8eExploit-DB\u6f0f\u6d1e\u5e93\u7684\u4f7f\u7528 <a href=\"http:\/\/www.91ri.org\/7276.html\" target=\"_blank\">http:\/\/www.91ri.org\/7276.html<\/a><\/p>\n<p>\u8bf4\u660e\uff1a\u8fd9\u662f\u6211\u4e4b\u524d\u6295\u7a3f\u5728<a href=\"http:\/\/www.91ri.org\/\" target=\"_blank\">http:\/\/www.91ri.org\/<\/a>\u4e0a\u9762\u7684\u6587\u7ae0\uff0c\u6240\u4ee5\u8fd9\u65f6\u8f6c\u8f7d\u8fc7\u6765\u653e\u5728blog\u91cc\u9762\u505a\u4e2a\u53c2\u8003\u5907\u4efd~<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4e4b\u524d\u5728\u7f51\u4e0a\u770b\u5230\u4e86\u4e0d\u5c11\u4ecb\u7ecd\u5982\u4f55\u5347\u7ea7BackTrack\u548cKail Linux\u4e0a\u7684Exploit-DB\u6f0f\u6d1e\u5229\u7528\u5e93\u7684\u6587 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,25,12],"tags":[74,68,147,148,78],"class_list":["post-318","post","type-post","status-publish","format-standard","hentry","category-linux","category-security","category-tools","tag-awk","tag-backtrack","tag-exploit-db","tag-kalilinux","tag-sed"],"views":14319,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":0,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/318\/revisions"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}