Known Vulnerabilities
Once you hear about a new exploit you will need to quickly find a POC for it and start mass scanning all of your targets for that vulnerability.
There are only three steps when using this approach:
Determine your target tech stack.
Search for any vulnerabilities in that tech stack.
Run the exploits.
Identifying technologies
Wappalyzer
Powered By
Identifying the vulnerabilities
Google
Try typing the following search queries into Google:
<TECHNOLOGY> <VERSION> vulnerabilities
<TECHNOLOGY> <VERSION> exploits
ExploitDB
ExploitDB provides us with the proof of concept(POC) code as well.
Online: https://www.exploit-db.com/
--> searchsploit “name of technology”
CVE
To exploit a CVE you need the proof of concept(POC) exploit code, without that you're stuck.
Finding the POC
Github
ExploitDB
Exploitation
Run the exploit on your target and review the results to see if they are vulnerable or not.
Last updated