Skip to content

0x0d3ad/CVE-2024-3400

Folders and files

NameName
Last commit message
Last commit date

Latest commit

9caa7b7 · 

History

5 Commits

Repository files navigation

CVE-2024-3400

This script is a simple tool for exploiting vulnerable PAN-OS firewalls. It allows users to perform attacks against vulnerable PAN-OS firewalls by injecting custom payloads into them. The script can be run by entering values directly or by using a CSV file containing a list of targets.

Usage:

Running the Script with Direct Values:

  1. Make sure you have Python 3.x installed along with the required libraries.
  2. Download or clone this repository into your system.
  3. Open a terminal or command prompt and navigate to the directory where you have saved this repository.
  4. Run the script by executing the command python3 exploit.py.
  5. Choose option 'D' to enter values directly.
  6. Follow the prompts to input the firewall IP address, payload to be executed, and the path to the root CA certificate if required.

Running the Script with a CSV File:

  1. Make sure you have Python 3.x installed along with the required libraries.
  2. Prepare a CSV file containing a list of targets you want to attack. The format should be three columns: firewall IP address, payload, and the path to the root CA certificate (optional).
  3. Save the CSV file to a location on your system.
  4. Download or clone this repository into your system.
  5. Open a terminal or command prompt and navigate to the directory where you have saved this repository.
  6. Run the script by executing the command python3 exploit.py.
  7. Choose option 'C' to use a CSV file.
  8. Enter the path to the CSV file when prompted.
  9. The script will read the CSV file, exploit each listed target, and print the results.

Make sure to use this tool responsibly and only for legitimate purposes. Misusing this tool to conduct unauthorized attacks is strictly prohibited.

Exploit

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages