6 Years of Service
40%
CVE-2018-15473-Exploit
Exploit written in Python for CVE-2018-15473 with threading and export formats
Threading - default 5
If more than 10 are used, often the OpenSSH service gets overwhelmed and causes retries
Single username evaluation via username parameter
Single username evaluation via username parameter
Multiple username evaluation via userList parameter
Multiple username evaluation file output via outputFile parameter
Multiple output formats (list, json, csv) via outputFormat parameter
An example username input file is given in exampleInput.txt
An example results output file in List format is given in exampleOutput.txt
An example results output file in JSON format is given in exampleOutput.json
An example results output file in CSV format is given in exampleOutput.csv
Multiple username evaluation file output via outputFile parameter
Multiple output formats (list, json, csv) via outputFormat parameter
An example username input file is given in exampleInput.txt
An example results output file in List format is given in exampleOutput.txt
An example results output file in JSON format is given in exampleOutput.json
An example results output file in CSV format is given in exampleOutput.csv
Build the image:
docker build -t cve-2018-15473 .
Run the exploit:
docker run cve-2018-15473 -h
Delete containers and image:
docker ps -a | awk '$2 == "cve-2018-15473" {print $1}' | xargs docker rm docker rmi cve-2018-15473
This link is hidden for visitors. Please Log in or register now.