Updates Windows-Exploit-Suggester v-21

Updates Windows-Exploit-Suggester v-21

+# v21 2015-01-22
+# – changed display formatting to include nested/linked MS numbers. makes it
+# easier to determine the dependencies
+# – made args global
+# – changed some code formatting, including double-space instead of \t
+# – added some additional comments
+# – disable ANSI output if on windows platform
+# – added recent exploits

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
It requires the ‘systeminfo’ command output from a Windows host in order to compare that the Microsoft security bulletin database and determine the patch level of the host.

It has the ability to automatically download the security bulletin database from Microsoft with the –update flag, and saves it as an Excel spreadsheet.

OS platform : Kali Linux, Backtrack & Debian 7-8

OS platform : Kali Linux, Backtrack & Debian 7-8

When looking at the command output, it is important to note that it assumes all vulnerabilities and then selectively removes them based upon the hotfix data. This can result in many false-positives, and it is key to know what software is actually running on the target host. For example, if there are known IIS exploits it will flag them even if IIS is not running on the target host.
The output shows either public exploits (E), or Metasploit modules (M) as indicated by the character value.
Usage :

 install dependencies

(install python-xlrd, $ pip install xlrd –upgrade)
feed it “systeminfo” input, and point it to the microsoft database

possible exploits for an operating system can be used without hotfix data

Currently, if the ‘systeminfo’ command reveals ‘File 1’ as the output for the hotfixes, it will not be able to determine which are installed on the target. If this occurs, the list of hotfixes will need to be retrieved from the target host and passed in using the –hotfixes flag

It currently does not seperate ‘editions’ of the Windows OS such as ‘Tablet’ or ‘Media Center’ for example, or different architectures, such as Itanium-based only. False positives also occur where it assumes EVERYTHING is installed on the target Windows operating system. If you receive the ‘Fil 1’ output, try executing ‘wmic qfe list full’ and feed that as input with the –hotfixes flag, along with the ‘systeminfo’

Download zipball  | or git clone
Read More in here : http://blog.gdssecurity.com/ our post BEFORE