No operating system is stricken with as many vulnerabilities as Windows, and it’s often a race to release the latest patches to fix things. From an attacker’s point of view, knowing which patches are present on a Windows machine can make or break successful exploitation. Today, we will be covering three methods of patch enumeration, using Metasploit, WMIC, and Windows Exploit Suggester.

For Metasploit, we will use a post module to find missing patches. With WMIC, we will run commands directly from a shell on the system to view quick fix engineering patches. And using Windows Exploit Suggester… more


Go to Source

 

Comments are closed.