CVE-2024-6387-Checker is a tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the recently discovered regreSSHion vulnerability (CVE-2024-6387). This script facilitates rapid scanning of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure is secure.
- Rapid Scanning: Quickly scan multiple IP addresses, domain names, and CIDR ranges for the CVE-2024-6387 vulnerability.
- Banner Retrieval: Efficiently retrieves SSH banners without authentication.
- Multi-threading: Uses threading for concurrent checks, significantly reducing scan times.
- Detailed Output: Provides clear, emoji-coded output summarizing scan results.
- Port Check: Identifies closed ports and provides a summary of non-responsive hosts.
python CVE-2024-6387.py <targets> [--port PORT]
python CVE-2024-6387.py 192.168.1.1
python CVE-2024-6387.py -l ip_list.txt
python CVE-2024-6387.py 192.168.1.1 example.com 192.168.1.2
python CVE-2024-6387.py 192.168.1.0/24
python CVE-2024-6387.py 192.168.1.1 example.com --port 2222
Qualys Blog on regreSSHion Vulnerability Qualys TXT on regreSSHion Vulnerability