01 // Briefing
From browser to terminal
So far every CVE you've handled has been through a web browser - NVD, MITRE ATT&CK, CISA. Browsers are fine for reading. The terminal is where the actual work happens. Today you start using it.
Your Kali box already has every tool you need. searchsploit is a local, offline-searchable copy of the Exploit-DB database - when you run searchsploit log4j, you get a list of every public exploit indexed against Log4j, with file paths to the actual code. No network round-trip. No login. Just answers.
You're going to run through searchsploit against three sets of CVEs: yesterday's case-study CVEs, the Activity 4 CVEs from the in-person session, and the 3-5 CVEs from your actor profile in Lab 01. Then you'll cross-reference everything against the CISA KEV catalogue from the terminal - no browser.
// Objectives
searchsploit - searching, reading, mirroring exploits.cd, ls, mkdir, less.