xaitax / CVE-2024-6387_Check

CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2024-6387_Check

πŸ“œ Description

CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the recently discovered regreSSHion vulnerability (CVE-2024-6387). This script facilitates rapid scanning of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure is secure.

🌟 Features

  • Rapid Scanning: Quickly scan multiple IP addresses, domain names, and CIDR ranges for the CVE-2024-6387 vulnerability.
  • Banner Retrieval: Efficiently retrieves SSH banners without authentication.
  • Multi-threading: Uses threading for concurrent checks, significantly reducing scan times.
  • Detailed Output: Provides clear, emoji-coded output summarizing scan results.
  • Port Check: Identifies closed ports and provides a summary of non-responsive hosts.

πŸš€ Usage

python CVE-2024-6387_Check.py <targets> [--port PORT]

Examples

Single IP

python CVE-2024-6387_Check.py 192.168.1.1

IPs from a list

python CVE-2024-6387_Check.py -l ip_list.txt

Multiple IPs and Domains

python CVE-2024-6387_Check.py 192.168.1.1 example.com 192.168.1.2

CIDR Range

python CVE-2024-6387_Check.py 192.168.1.0/24

With Custom Port

python CVE-2024-6387_Check.py 192.168.1.1 example.com --port 2222

Output

The script will provide a summary of the scanned targets:

  • 🚨 Vulnerable: Servers running a vulnerable version of OpenSSH.
  • πŸ›‘οΈ Not Vulnerable: Servers running a non-vulnerable version of OpenSSH.
  • πŸ”’ Closed Ports: Count of servers with port 22 (or specified port) closed.
  • πŸ“Š Total Scanned: Total number of targets scanned.
πŸ›‘οΈ Servers not vulnerable: 1

   [+] Server at 157.90.125.31 (running SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11)

🚨 Servers likely vulnerable: 2

   [+] Server at 4.231.170.121 (running SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.10)
   [+] Server at 4.231.170.122 (running SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u2)

πŸ”’ Servers with port 22 closed: 254

πŸ“Š Total scanned targets: 257

πŸ“š References

Qualys Blog on regreSSHion Vulnerability

About

CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH

License:GNU General Public License v3.0


Languages

Language:Python 100.0%