Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6387 PoC — Openssh: regresshion - race condition in ssh allows rce/dos

Source
Associated Vulnerability
Title:Openssh: regresshion - race condition in ssh allows rce/dos (CVE-2024-6387)
Description:A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Description
SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.
Readme
# SentinelSSH: Advanced CVE-2024-6387 Vulnerability Scanner

SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.

## Installation

To install SentinelSSH, make sure you have Go installed on your system (version 1.16 or later), then run:

```bash
go install github.com/harshinsecurity/sentinelssh/cmd/sentinelssh@latest
```
## Usage

After installation, you can run SentinelSSH directly from the command line:

```bash
sentinelssh [flags] [targets...]
```

### Flags

- `--port, -p`: Target port number (default: 22)
- `--timeout, -t`: Connection timeout in seconds (default: 5)
- `--concurrency, -c`: Number of concurrent scans (default: 100)
- `--output, -o`: Output file for detailed results (CSV format)
- `--file, -f`: File containing list of targets

### Examples

Scan a single IP:
```bash
sentinelssh 192.168.1.1
```

Scan a domain:
```bash
sentinelssh example.com
```

Scan multiple targets:
```bash
sentinelssh example.com 192.168.1.1 10.0.0.1
```

Scan targets from a file:
```bash
sentinelssh -f targets.txt
```

Save results to a CSV file:
```bash
sentinelssh -o results.csv 192.168.1.1 example.com
```

Custom port and higher concurrency:
```bash
sentinelssh --port 2222 --concurrency 200 192.168.1.0/24
```

## Features

- Targeted CVE-2024-6387 detection
- Support for IP addresses, domain names, and CIDR ranges
- High-speed concurrent scanning
- Comprehensive version analysis
- Detailed, color-coded console output
- CSV export for further analysis
- Customizable scan parameters

## License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## Contributing

Contributions are welcome! Please feel free to submit a Pull Request.
File Snapshot

[4.0K] /data/pocs/85986d740854a408bee776f4d4ed053932bc913d ├── [4.0K] cmd │   └── [4.0K] sentinelssh │   └── [4.7K] main.go ├── [ 173] go.mod ├── [4.6K] go.sum ├── [4.0K] internal │   ├── [4.0K] analyzer │   │   └── [1.2K] analyzer.go │   ├── [4.0K] scanner │   │   └── [1002] scanner.go │   └── [4.0K] utils │   └── [ 905] utils.go ├── [1.0K] LICENSE ├── [4.0K] pkg │   └── [4.0K] models │   └── [ 115] result.go └── [1.8K] README.md 8 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →