CVE-2018-15473-Exploit icon indicating copy to clipboard operation
CVE-2018-15473-Exploit copied to clipboard

Exploit written in Python for CVE-2018-15473 with threading and export formats

Results 20 CVE-2018-15473-Exploit issues
Sort by recently updated
recently updated
newest added

I copy the code and save on my ```user_enum_new.py``` file i am not good in python after giving execute permission i ran this command ```./user_enum_new.py --username root 2.2.2.2``` for exploit...

The new version of paramiko is incompatible with the code.

I'm troubling with this ![Capture](https://user-images.githubusercontent.com/79529007/137541690-bcabeb45-4e88-4e5d-8e7d-46653de94d03.PNG)

I patched commit f8dc16b to get paramiko working. However, for any host (patched or unpatched) I've tried I get: $ docker run cve-2018-15473 --port 22 --username admin 10.193.247.57 /usr/lib/python2.7/site-packages/paramiko/kex_ecdh_nist.py:39: CryptographyDeprecationWarning:...

I'm trying to get the data in json and I'm not able to, I only get the data in console, I use this command: python3 sshUsernsame

Would you mind adding a license to make it possible to use the code? CC0, or a permissive (like Apache 2.0, MIT or BSD) maybe? Thank you!

``` python3.7 sshUsernameEnumExploit.py Traceback (most recent call last): File "sshUsernameEnumExploit.py", line 33, in old_parse_service_accept = paramiko.auth_handler.AuthHandler._handler_table[paramiko.common.MSG_SERVICE_ACCEPT] TypeError: 'property' object is not subscriptable ```

The docker image file is based now on python:2