Skip to content

Commit d8ca5a0

Browse files
committed
Merge pull request #41 from tdoan-r7/mod_doc_cmd
Adding docs for Lester MS-1193
2 parents 324a41e + 925cc3b commit d8ca5a0

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
The Local Exploit Suggester is a post-exploitation module that you can use to check a system for local vulnerabilities. It performs local exploit checks; it does not actually run any exploits, which is useful because this means you to scan a system without being intrusive. In addition to being stealthy, it's a time saver. You don't have to manually search for local exploits that will work; it'll show you which exploits the target is vulnerable to based on the system's platform and architecture.
2+
3+
The Local Exploit Suggester is available for Python, PHP, and Windows Meterpreter.
4+
5+
6+
## Vulnerable Application
7+
8+
To use the Local Exploit Suggester:
9+
10+
* You must have an open Meterpreter session.
11+
12+
## Verification Steps
13+
14+
Please see the Overview section.
15+
16+
##Options
17+
18+
You can set the following options for the Local Exploit Suggester:
19+
20+
* **showdescription** - Set this option to true to see more details about each exploit.
21+
22+
23+
## Scenarios
24+
25+
When the Local Exploit Suggester runs, it displays a list of local exploits that the target may be vulnerable to, and it tells you the likelihood of exploitation.
26+
27+
The following terms are used to help you understand how vulnerable a target is to a particular exploit:
28+
29+
* **Vulnerable** - Indicates that the target is vulnerable.
30+
* **Appears** - Indicates that the target may be vulnerable based on the file version, but the vulnerable code has not been tested.
31+
* **Detected** - Indicates that the target has the file, but it cannot be determined whether or not the target is vulnerable.

0 commit comments

Comments
 (0)