mgregus / project_BIT_nmap_script

Nmap .nse script to scan for CVE-2022-32073 in wolfssh

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Python program to detect vulnerability with CVE-2022-32073 in large networks

This python program runs nmap on an address passed as an argument, by default it runs on all ports but port number can also be given as an argument. It runs nmap with custom created wolf_ssh_version.nse scripts which uses fingerprinting to identify wolfSSH v1.4.7 which contains an integer overflow vulnerability with assigned CVE-2022-32073. Program can be run on any machine which has following prerequisites installed: nmap and also python3 along with necessary libraries.

Run the program with following commands

To see options and description run the program with the following command.

python3 scanner_for_CVE-2022-32073.py --help

To run the program on a given address or address range and scan all ports on each host use the following command

python3 scanner_for_CVE-2022-32073.py -a IP

To run the program on a given address or address range and scan given port or port range on each host use the following command

python3 scanner_for_CVE-2022-32073.py -a IP -p PORTS 

Sample usage and output

The screenshot shows sample use of the programs fingerprinting ability and output formatting on a different version of SSH.

sample progr. usage

Resources

For more info refer to the Documentation.pdf or refer to the https://nmap.org/.

About

Nmap .nse script to scan for CVE-2022-32073 in wolfssh

License:MIT License


Languages

Language:Python 66.0%Language:Lua 34.0%