Get data from scanned ports and services with OS fingerprint (if exists) and query exploitsearch.net to get possible number of exploits on specific service.
Usage: nmap -sC -O ipLocation -script xploitSearch.nse --script exploit-search.nse [--script-args detailed=<boolean> forcedOS=<String> exploitsOnly=<boolean> ] <target>
For detailed usage check script source (LuaDoc)
####DISCLAIMER: Number of shown exploits doesn't reflect possible number of security holes that exists on your server. exploitsearch.net crawls possible security databases and depending on the quality of the query returns different results.
###Contributors:
- Mario Oršolić - (https://github.com/originx)
###TO DO: -Improve OS fingerprint query if possible
-Improve port and service data gathering and querying
-Set http headers for more polite querys.
-Clean up code <- prehaps there are some finished libraries for eg. url escape chars.
##Mentored under: ####FOI OSS
- Open Systems and Security Lab
- Faculty of Organization and Informatics
- http://security.foi.hr/wiki/index.php/Glavna_stranica
- Class: Sigurnost informacijskih sustava
Tonimir Kišasondi - (https://github.com/tkisason)