Share
## https://sploitus.com/exploit?id=43C3EC5E-B4E5-59BB-97BA-94F01D0DE287
# Juniper Scanner
Scanner for CVE-2023-36845 by bt0

More information about the Vulnerability:
https://supportportal.juniper.net/JSA72300

[![License: GPL v3](https://img.shields.io/badge/License-GPL%20v3-blue.svg)](http://www.gnu.org/licenses/gpl-3.0)

## Requirements:
--------------------

- python3+
- shodan
- colorama
- urlopen
- pyOpenSSL
- censys

  * $ python3 -m pip install -r requirements.txt

## Options
--------------

```
-h, --help            show this help message and exit
-H HOST, --host HOST  IP or Hostname of target
-p PORT, --port PORT  Port of target. Default=443
-hl HOSTLIST, --hostlist HOSTLIST
                      Use a hosts list e.g. ./hosts.txt
-s, --shodan          Search for hosts in Shodan (Needs api key)
--censys results [page ...]
                        Search for hosts in Censys (Needs api key). Use --censys <results> <per_page>

--version             show program's version number and exit
```

## For Shodan Search
--------------------

You should buy a shodan subscription to have access to API key
Visit https://account.shodan.io/billing for more information

## For Censys Search
--------------------

Just register to Censys search to acquire an API key
https://censys.io/register

To setup your credentials and execute the script, use environment variables on linux
```
$ export CENSYS_API_ID=<your-api-id>
$ export CENSYS_API_SECRET=<your-api-secret>
```

## Disclaimer
--------------

This is published for educational and informational purposes only, and the developers accept no responsibility for the use of it by users.
Our team will not aid, or endorse any use of this exploit for malicious activity, thus if you ask for help you may be required to provide us with proof that you either own the target service or you have permissions to pentest on it.