Projects STRLCPY CVE-2024-3400 Commits 7ec63f23
🤬
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 56 lines
    57 57   ```bash
    58 58   response = requests.post(url, headers=headers, data=data, timeout=5, verify='/path/to/root_CA_certificate.pem')
    59 59   
     60 +## CSV File Instructions
     61 +This script allows you to exploit multiple targets of vulnerable PAN-OS Firewalls using a CSV file. Below are the instructions for formatting the CSV file correctly:
     62 + 
     63 +### CSV File Format:
     64 +The CSV file should have three columns:
     65 + 
     66 +ipaddress: The IP address of the vulnerable PAN-OS Firewall.
     67 +payload: The payload to execute on the firewall.
     68 +path/to/root_CA_certificate.pem: The path to the root CA certificate (leave blank if certificate verification is disabled).
     69 + 
     70 + - Example CSV File:
     71 + ```bash
     72 + ipaddress,payload,path/to/root_CA_certificate.pem
     73 + 192.168.1.1,exploit_payload1,/path/to/certificate.pem
     74 + 192.168.1.2,exploit_payload2,
     75 + 
     76 +### Instructions:
     77 +Create a CSV file with the specified format.
     78 +Fill in the IP addresses, payloads, and root CA certificate paths (if applicable).
     79 +Make sure to provide valid paths to the root CA certificates or leave the field blank if certificate verification is disabled.
     80 +Run the script and choose the option to use the CSV file when prompted.
     81 + 
    60 82  ## References
    61 83   
    62 84  - https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-pan-os-firewall-zero-day-used-in-attacks/
    skipped 4 lines
Please wait...
Page is in error, reload to recover