halencarjunior / CVE-2023-36845

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Juniper Scanner

Scanner for CVE-2023-36845 by bt0

More information about the Vulnerability: https://supportportal.juniper.net/JSA72300

License: GPL v3

Requirements:


  • python3+

  • shodan

  • colorama

  • urlopen

  • pyOpenSSL

  • censys

    • $ python3 -m pip install -r requirements.txt

Options


-h, --help            show this help message and exit
-H HOST, --host HOST  IP or Hostname of target
-p PORT, --port PORT  Port of target. Default=443
-hl HOSTLIST, --hostlist HOSTLIST
                      Use a hosts list e.g. ./hosts.txt
-s, --shodan          Search for hosts in Shodan (Needs api key)
--censys results [page ...]
                        Search for hosts in Censys (Needs api key). Use --censys <results> <per_page>

--version             show program's version number and exit

For Shodan Search


You should buy a shodan subscription to have access to API key Visit https://account.shodan.io/billing for more information

For Censys Search


Just register to Censys search to acquire an API key https://censys.io/register

To setup your credentials and execute the script, use environment variables on linux

$ export CENSYS_API_ID=<your-api-id>
$ export CENSYS_API_SECRET=<your-api-secret>

Disclaimer


This is published for educational and informational purposes only, and the developers accept no responsibility for the use of it by users. Our team will not aid, or endorse any use of this exploit for malicious activity, thus if you ask for help you may be required to provide us with proof that you either own the target service or you have permissions to pentest on it.

About


Languages

Language:Python 100.0%