Adding docs for Lester https://issues.corp.rapid7.com/browse/MS-1193
parent
0852973b18
commit
925cc3b56f
|
@ -0,0 +1,31 @@
|
|||
The Local Exploit Suggester is a post-exploitation module that you can use to check a system for local vulnerabilities. It performs local exploit checks; it does not actually run any exploits, which is useful because this means you to scan a system without being intrusive. In addition to being stealthy, it's a time saver. You don't have to manually search for local exploits that will work; it'll show you which exploits the target is vulnerable to based on the system's platform and architecture.
|
||||
|
||||
The Local Exploit Suggester is available for Python, PHP, and Windows Meterpreter.
|
||||
|
||||
|
||||
## Vulnerable Application
|
||||
|
||||
To use the Local Exploit Suggester:
|
||||
|
||||
* You must have an open Meterpreter session.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
Please see the Overview section.
|
||||
|
||||
##Options
|
||||
|
||||
You can set the following options for the Local Exploit Suggester:
|
||||
|
||||
* **showdescription** - Set this option to true to see more details about each exploit.
|
||||
|
||||
|
||||
## Scenarios
|
||||
|
||||
When the Local Exploit Suggester runs, it displays a list of local exploits that the target may be vulnerable to, and it tells you the likelihood of exploitation.
|
||||
|
||||
The following terms are used to help you understand how vulnerable a target is to a particular exploit:
|
||||
|
||||
* **Vulnerable** - Indicates that the target is vulnerable.
|
||||
* **Appears** - Indicates that the target may be vulnerable based on the file version, but the vulnerable code has not been tested.
|
||||
* **Detected** - Indicates that the target has the file, but it cannot be determined whether or not the target is vulnerable.
|
Loading…
Reference in New Issue