关联漏洞
描述
Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.
介绍
# pulsexploit
Automated script for Pulse Secure SSL VPN exploit ([CVE-2019-11510](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11510 "CVE 2019-11510")) using hosts retrieved from Shodan API. You must have a Shodan account to use this script. Click [here](https://account.shodan.io/register) if you don't have Shodan account.

## Installation
1. Install dependencies.
```bash
# CentOS & Fedora
yum install git python3 -y
# Ubuntu & Debian
apt install git python3 python3-pip -y
# FreeBSD
pkg install -y python3 git
python3 -m ensurepip
```
2. Clone repository & install python3 module
```bash
git clone https://github.com/andripwn/pulse-exploit.git
cd pulse-exploit
pip3 install -r requirements.txt
```
3. Add your Shodan API key and edit the search query
```python
# Shodan API Key (change according to your Shodan API key)
api_key = ''
# Shodan search query (edit this, but don't remove the html and port)
search_query = 'html:"/dana/" port:"443"'
```
## Usage
```bash
python3 pulsexploit.py -t <number of threads/ default: 5>
```
## Disclaimer
This script is only for penetration testing and security research, I will not be responsible if you use it for illegal activities.
文件快照
[4.0K] /data/pocs/2d2aa9327901cab10311ed6c7a94d9c37f7fe199
├── [1.0K] LICENSE
├── [7.3K] pulsexploit.py
├── [1.3K] README.md
└── [ 6] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。