Type your comment> @ellj said:
Type your comment> @CyberG33k said:
Type your comment> @lebutter said:
How come the vulnerabilities are not in Searchsploit ?
The one that gets you the shell is. The one that gets you the details is in Metasploit but i would not use it. It is painfully slow
Can fucking confirm, it is painfully slow
Someone plz DM me with better way
If you look at the code , and you did enough enumeration to understand what tables you want, you can modify the metasploit module to only download the table you want. You should be able to figure it out and download the table if far less time that waiting for it to complete.