POC详情: 6688c053341c9e77aef48972abd4893b22d732c8

来源
关联漏洞
标题: OpenSSH 安全漏洞 (CVE-2024-6387)
描述:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在安全漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。
介绍
## CVE-2024-6387_Check: A Vulnerability Check Tool


##  Description

CVE-2024-6387_Check is a lightweight and efficient tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the regreSSHion vulnerability (CVE-2024-6387). This script simplifies the quick analysis of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure remains secure.

##  Features

- *Fast Analysis:*  Quickly scans multiple IP addresses, domain names, and CIDR ranges for CVE-2024-6387 vulnerability.

- *Banner Retrieval:*  Efficiently retrieves SSH banners without authentication.

- *Multi-threading:*  Utilizes threads for simultaneous checks, significantly reducing scan time.

- *Detailed Output:*  Provides a clear output summarizing the scan results.

- *Port Checking:*  Identifies closed ports and provides a summary of unresponsive hosts.

##  Usage

`python CVE-2024-6387_Check.py <targets> [--port PORT] [--timeout TIMEOUT] [--list FILE]`


### Examples

#### Single IP

`python CVE-2024-6387_Check.py 192.168.1.1`


#### IPs from a file

`python CVE-2024-6387_Check.py -l ip_list.txt`


#### Multiple IPs and domains

`python CVE-2024-6387_Check.py 192.168.1.1 example.com 192.168.1.2`


#### CIDR range

`python CVE-2024-6387_Check.py 192.168.1.0/24`


#### With custom port

`python CVE-2024-6387_Check.py 192.168.1.1 example.com --port 2222`




文件快照

[4.0K] /data/pocs/6688c053341c9e77aef48972abd4893b22d732c8 ├── [7.4K] CVE-2024-6387_Check.py └── [1.4K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。