Closed marcelosz closed 7 years ago
Hi marcelosz. Any help with the exploits would be appreciated as it all manually implemented when I have time and remember!
This is done in the exploits (Line 1235) set of sets. Each exploit bulletin, referenced by MSXX-XXX as a parameter of ALERT.MSF or ALERT.EXP. Sometimes I have to manually identify the proof-of-concept to the MS number if it is not provided in the PoC/exploit.
ALERT.MSF - Indicates there is an exploit in Metasploit ALERT.EXP - Indicates that there is a proof-of-concept or other script.
Recently I've started including CVE references and other resources linking to exploit-db and blogs.
Sam
How can we update the script to detect new bulletins/hotfixes? It seems to be hardcoded, right? Do you need any help on that?