关联漏洞
标题:
OpenSSH 竞争条件问题漏洞
(CVE-2018-15473)
描述:OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 7.7及之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。
描述
A Bash script to enumerate valid SSH usernames using the CVE-2018-15473 vulnerability. It checks for valid usernames on an OpenSSH OpenSSH 7.2p2 server by analyzing authentication responses.
介绍
# ssh_Enum_vaild
A Bash script to enumerate valid SSH usernames using the CVE-2018-15473 vulnerability. It checks for valid usernames on an OpenSSH server by analyzing authentication responses.
# Features
✅ Detects valid SSH usernames based on OpenSSH response behavior
✅ Uses a public key authentication bypass technique
✅ Optimized for speed using parallel processing
✅ Saves valid usernames automatically to valid_usernames.txt
✅ Lightweight, requires only Bash and OpenSSH client
1. Only displays valid usernames (removes invalid ones from output).
2. Saves valid usernames to valid_usernames.txt.
3. Runs faster by executing checks in parallel.
# Usage
chmod +x exploit.sh
./exploit <target> <port> <username_file>
Example:
./exploit 192.168.1.1 22 usernames.txt
# Requirements
1.Linux/macOS with Bash
2.OpenSSH client (ssh, ssh-keygen, nc)
3.Target system running OpenSSH
⚠️ Disclaimer
This script is for educational and authorized security testing only. Do not use it on systems without permission.
🔗 CVE-2018-15473 Details
文件快照
[4.0K] /data/pocs/e559c4eaad50b6fcdf8f0f7294e06709703f7ef9
├── [7.0K] exploit.py
├── [1.6K] exploit.sh
└── [1.0K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。