## https://sploitus.com/exploit?id=1A779279-F527-5C29-A64D-94AAA4ADD6FD
# regresshion-check
`regresshion-check` is a Rust CLI tool to check SSH servers for vulnerability to CVE-2024-6387. It takes in a single IP or multiple IPs/CIDRs separated by newlines in a file. It includes the reverse DNS lookup and version string with any IPs detected as vulnerable.
(IPs listed in readme are examples only -- do not use)
## Prerequisites
- Rust and Cargo installed. You can install Rust and Cargo using [rustup](https://rustup.rs/).
## Building the Application
1. Clone the repository:
```sh
git clone git@github.com:wiggels/regresshion-check.git
cd regresshion-check
```
2. Build the application:
```sh
cargo build --release
```
## Usage
### Scan a Single IP Address
To scan a single IP address, use the `--individual` option followed by the IP address:
```sh
regresshion-check --individual <ip-address>
```
Example usage:
```sh
regresshion-check --individual 215.227.162.32
```
### Scan Multiple IP Addresses from a File
To scan multiple IP addresses listed in a file, use the `--file` option followed by the input file:
Example file contents:
```
215.227.64.0/24
215.227.162.32
```
Example usage:
```sh
regresshion-check --file /path/to/file/here.txt
```
### Scanning Batch Size
The scanning job batches based on the current ulimit size minus a buffer of 64. If you would like this application to run faster when doing larger CIDRs/lists, raise the ulimit. Example: `ulimit -n 8192`
### Example Output
```
{
"unknown": 226,
"patched": 29,
"vulnerable": 2,
"vulnerable_ips": [
{
"ip": "215.227.162.32",
"hostname": "some.server.somewhere.com",
"version": "SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.7"
},
{
"ip": "215.227.64.156",
"hostname": "another.server.somewhere.com",
"version": "SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.7"
}
]
}
```