Updates Windows-Exploit-Suggester revision v-2.9, 2015-09-16.

Updates Windows-Exploit-Suggester revision v-2.9, 2015-09-16.

Changelog Windows Exploit Suggester, revision 2.9, 2015-09-16:
– Added windows 10 Support

Updates Console v2.9

Updates Console v2.9

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
It requires the ‘systeminfo’ command output from a Windows host in order to compare that the Microsoft security bulletin database and determine the patch level of the host.

windows-exploit-suggester-v2.9 on Windows Console

windows-exploit-suggester-v2.9 on Windows Console

It has the ability to automatically download the security bulletin database from Microsoft with the –update flag, and saves it as an Excel spreadsheet.

OS platform : Kali Linux, Backtrack & Debian 7-8

OS platform : Kali Linux, Backtrack & Debian 7-8

When looking at the command output, it is important to note that it assumes all vulnerabilities and then selectively removes them based upon the hotfix data. This can result in many false-positives, and it is key to know what software is actually running on the target host. For example, if there are known IIS exploits it will flag them even if IIS is not running on the target host.
The output shows either public exploits (E), or Metasploit modules (M) as indicated by the character value.

update the database

Usage :

 install dependencies

(install python-xlrd, $ pip install xlrd –upgrade)
feed it “systeminfo” input, and point it to the microsoft database

possible exploits for an operating system can be used without hotfix data

Currently, if the ‘systeminfo’ command reveals ‘File 1’ as the output for the hotfixes, it will not be able to determine which are installed on the target. If this occurs, the list of hotfixes will need to be retrieved from the target host and passed in using the –hotfixes flag

It currently does not seperate ‘editions’ of the Windows OS such as ‘Tablet’ or ‘Media Center’ for example, or different architectures, such as Itanium-based only. False positives also occur where it assumes EVERYTHING is installed on the target Windows operating system. If you receive the ‘Fil 1’ output, try executing ‘wmic qfe list full’ and feed that as input with the –hotfixes flag, along with the ‘systeminfo’

Script :

Download zipball  | or git clone
Read More in here : http://blog.gdssecurity.com/ our post BEFORE