[Full-disclosure] Re: Links to Google's cache of 626 FrSIRT exploits

layne@xxxxxxxxxxx wrote:
So you never recursively sucked FrSIRT.com before the public exploits
section was "definitively closed" well we're in luck (at least for a
little while) because Google did.

This page links to Google's cache of 626 FrSIRT exploits


If you want to fetch them with wget, you'll need to supply a plausible
user-agent using the -U option on the command line. Without that, google
just returns a "403 Forbidden". I found the following technique worked:

wget 'http://www.elsenot.com/frsirt-google.html'
grep -o 'href="[^"]*"' frsirt-google.html | cut -d '"' -f 2 > list.txt
wget -i list.txt -U 'User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1;
en-GB; rv:1.7.10) Gecko/20050717 Firefox/1.0.6'

although IIRC you could also just pipe the output from grep | cut straight
into wget, should you want to save yourself the temporary listing file.

Can't think of a witty .sigline today....

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/