AonCyberLabs / Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
GNU General Public License v3.0
3.94k stars 1.02k forks source link

$ ./windows-exploit-suggester.py --database 2014-06-06-mssb.xlsx --systeminfo win7sp1-systeminfo.txt #21

Closed bganeshmail closed 7 years ago

bganeshmail commented 7 years ago

Hi Author,

I could not find the contact details to mail you so just raising the query using issues menu.

I have just gone thru the script and really found it excellent.

I have query on supplying the comands options like "$ ./windows-exploit-suggester.py --database 2014-06-06-mssb.xlsx --systeminfo win7sp1-systeminfo.txt"

Does win7sp1-systeminfo.txt file should conatin the systeminfo command or systeminfo command output.

Please advice.

sammbertram commented 7 years ago

Hi. The "win7sp1-systeminfo.txt" parameter the file that contains the command output. So you can just run:

C:\>systeminfo > win7sp1-systeminfo.txt

And then use that file in the --systeminfo parameter.

bganeshmail commented 7 years ago

Thank you very much .

Great news.

Regards, Ganesh B

On Tue, Jan 3, 2017 at 7:41 PM, sammbertram notifications@github.com wrote:

Hi. The "win7sp1-systeminfo.txt" parameter the file that contains the command output. So you can just run:

C:>systeminfo > win7sp1-systeminfo.txt

And then use that file in the --systeminfo parameter.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/GDSSecurity/Windows-Exploit-Suggester/issues/21#issuecomment-270121954, or mute the thread https://github.com/notifications/unsubscribe-auth/AVEb2xlhb1IayebPdQP1PwHZ_CGAObcwks5rOlcAgaJpZM4LQF7d .