• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

CVE-2018-15473 Openssh User enumeration

Status
Not open for further replies.

TheShadowX

New member
User
Joined
Dec 1, 2018
Messages
2
Reputation
0
Reaction score
8
Points
3
Credits
0
‎6 Years of Service‎
40%
CVE-2018-15473-Exploit​

Exploit written in Python for CVE-2018-15473 with threading and export formats​

Threading - default 5​

If more than 10 are used, often the OpenSSH service gets overwhelmed and causes retries
Single username evaluation via username parameter​

Multiple username evaluation via userList parameter
Multiple username evaluation file output via outputFile parameter
Multiple output formats (list, json, csv) via outputFormat parameter
An example username input file is given in exampleInput.txt
An example results output file in List format is given in exampleOutput.txt
An example results output file in JSON format is given in exampleOutput.json
An example results output file in CSV format is given in exampleOutput.csv​

Build the image:​

docker build -t cve-2018-15473 .​

Run the exploit:​

docker run cve-2018-15473 -h​

Delete containers and image:​

docker ps -a | awk '$2 == "cve-2018-15473" {print $1}' | xargs docker rm docker rmi cve-2018-15473​

This link is hidden for visitors. Please Log in or register now.
 
Status
Not open for further replies.
Back
Top