Cache

Type your comment> @CyberG33k said:

Type your comment> @ellj said:

Type your comment> @CyberG33k said:

Type your comment> @lebutter said:

How come the vulnerabilities are not in Searchsploit ?

The one that gets you the shell is. The one that gets you the details is in Metasploit but i would not use it. It is painfully slow

Can fucking confirm, it is painfully slow

Someone plz DM me with better way :frowning:

If you look at the code , and you did enough enumeration to understand what tables you want, you can modify the metasploit module to only download the table you want. You should be able to figure it out and download the table if far less time that waiting for it to complete.

I did that and it still took me easily 30min… i’m now doing it the intended way which is interesting.