In this blog we will look at how Windows versioning works and then go through the steps of obtaining the Windows version information and list of installed KBs from the local or a remote system. With this information we are then able to quickly identify vulnerabilities for the system they are attacking and, if available, use an exploit to extend their foothold. This will help us to quickly assess the risk the system is exposed to. The Windows Exploit Suggester – Next Generation tools wes.py and missingkbs.vbs that I developed will support the identification process as efficiently as possible.
Before diving into how to identify missing KBs, let’s first get some context on how Windows releases work.
This post was created with our nice and easy submission form. Create your post!
GIPHY App Key not set. Please check settings