Share
## https://sploitus.com/exploit?id=896B5857-A9C8-5342-934A-74F1EA1934CF
This script checks if servers are running a vulnerable version of OpenSSH based on specified targets. It uses threading for concurrent scanning of multiple targets and ports.

Installation:

  git clone https://github.com/sardine-web/CVE-2024-6387_Check.git  
  cd CVE-2024-6387_Check


Usage

To check if servers are vulnerable to OpenSSH vulnerabilities:


python main.py <targets> [-p PORT] [-t TIMEOUT]

Options

    <targets>: List of IP addresses, domain names, file paths containing IP addresses, or CIDR network ranges.
    -p, --port PORT: Port number to check (default: 22).
    -t, --timeout TIMEOUT: Connection timeout in seconds (default: 1 second).

Example

Check vulnerabilities for a list of IP addresses:

css

python main.py 192.168.1.1 192.168.1.2 -p 22 -t 2.0

License

This project is licensed under the MIT License - see the LICENSE file for details.
Author

sardine-web - GitHub

   Dependencies:
   
        This script uses Python 3. Make sure Python 3 is installed on your system.
        socket: Standard library for socket programming.
        argparse: Standard library for parsing command-line arguments.
        ipaddress: Library for handling IP addresses and networks.
        threading: Standard library for multi-threading support.
        queue: Standard library for thread-safe queue implementation